D:\sbroot\obj\eip\x86_nt_5_debug\eip\dk\msg\THA\debug_obj_v71\cmbmsgdl8171d.pdb
Static task
static1
Behavioral task
behavioral1
Sample
662e1de9efad74f9c483937daa019ad050f55b8f7f523280df9f4003393a255b.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
662e1de9efad74f9c483937daa019ad050f55b8f7f523280df9f4003393a255b.dll
Resource
win10v2004-20240226-en
General
-
Target
662e1de9efad74f9c483937daa019ad050f55b8f7f523280df9f4003393a255b
-
Size
128KB
-
MD5
dddef3c355eee8cfa636f74e97db9608
-
SHA1
0917d52ddc4ef038d1abb15392a1c51f7c0a1cbb
-
SHA256
662e1de9efad74f9c483937daa019ad050f55b8f7f523280df9f4003393a255b
-
SHA512
691e712e4e8a82ec157ea1d1cfb02a58cd4d024c6352a5c47633d22112c46dbac37e81b495325d1207cba2ccff2d7a953fce51f36d8335fecc5845744961f047
-
SSDEEP
3072:wQnlrXN3VmWs/rY2xp3tmVYeqy3lc8Ag:wYlrXN3VmX/rPx9IUng
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 662e1de9efad74f9c483937daa019ad050f55b8f7f523280df9f4003393a255b
Files
-
662e1de9efad74f9c483937daa019ad050f55b8f7f523280df9f4003393a255b.dll windows:4 windows x86 arch:x86
e7e0b58d05ed28f21fb87cde9fa6ee95
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TerminateProcess
GetCurrentProcess
ExitProcess
GetProcAddress
GetModuleHandleA
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetLastError
GetLastError
GetCurrentThread
IsBadWritePtr
IsBadReadPtr
HeapValidate
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
UnhandledExceptionFilter
RtlUnwind
WriteFile
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
DebugBreak
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
VirtualQuery
InterlockedExchange
GetTimeFormatA
GetDateFormatA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
LCMapStringA
LCMapStringW
SetConsoleCtrlHandler
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
SetFilePointer
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
CloseHandle
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ