c:\jenkins\workspace\8-2-build-windows-i586-cygwin\jdk8u281\880\build\windows-i586\deploy\tmp\jp2ssv\obj\jp2ssv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e6119be03de7f9c75f6d992bddcbc7d08d4d80daac793208e08f13c9ca886425.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e6119be03de7f9c75f6d992bddcbc7d08d4d80daac793208e08f13c9ca886425.dll
Resource
win10v2004-20240704-en
General
-
Target
e6119be03de7f9c75f6d992bddcbc7d08d4d80daac793208e08f13c9ca886425
-
Size
533KB
-
MD5
671092a9bc465990c21472dc00b5a9cb
-
SHA1
158d2b6571ed5128ad392588afb830e72f1b79f6
-
SHA256
e6119be03de7f9c75f6d992bddcbc7d08d4d80daac793208e08f13c9ca886425
-
SHA512
44edf1a2adad06812c405a2ba0910b8847441bf4f7bf18e48d8c23d2a0b4588b715ae28a8e7c69acfa2956348f130f6fbe7bfb708702e77d3bda0a64a31a138b
-
SSDEEP
12288:bhZj9V02b8LF/yrTrsqpVauYeIoeNtBV7UG:YI8LFMsqjPYeUNt/U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6119be03de7f9c75f6d992bddcbc7d08d4d80daac793208e08f13c9ca886425
Files
-
e6119be03de7f9c75f6d992bddcbc7d08d4d80daac793208e08f13c9ca886425.dll regsvr32 windows:6 windows x86 arch:x86
2b0d6dc2e023c357433961d32e470ed8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
CloseHandle
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
WaitForSingleObject
CreateMutexA
DisableThreadLibraryCalls
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
SizeofResource
lstrcmpiA
OpenMutexA
FindResourceA
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
LoadLibraryA
VerSetConditionMask
GetEnvironmentVariableA
CreateFileA
GetLongPathNameA
GetTempPathA
GetCurrentProcess
CreateProcessA
OpenProcess
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetNativeSystemInfo
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
GetShortPathNameA
FormatMessageA
lstrlenA
VerifyVersionInfoA
WTSGetActiveConsoleSessionId
GetFileAttributesA
GetSystemWindowsDirectoryA
OutputDebugStringA
GetCurrentProcessId
GetCurrentThreadId
IsDebuggerPresent
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
WriteConsoleW
SetEndOfFile
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WriteFile
SetFilePointerEx
GetFileSizeEx
GetStringTypeW
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
SetEnvironmentVariableW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTimeZoneInformation
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetStdHandle
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetProcessHeap
user32
wsprintfA
CharNextA
OpenInputDesktop
CloseDesktop
GetShellWindow
GetWindowThreadProcessId
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitialize
StringFromCLSID
oleaut32
SysAllocString
VarUI4FromStr
SysFreeString
SysStringLen
VariantClear
SysAllocStringByteLen
Exports
Exports
CheckMozJavaPlugins
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RedirectAllStaticVersionKeys
RedirectSelectedStaticVersionKeys
RegKeyBranchNeedsUpdating
RemoveAllMozillaJavaPlugins
RunBrokerProcess
UpdateTreatAsKey
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 275KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ