D:\qb\workspace\26444\source\Build\mfts\x32\__bin\Release\mfx_mft_h264ve_32_full.pdb
Static task
static1
Behavioral task
behavioral1
Sample
12d6d628a34a16398ccc4e41b5dc2a30N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
12d6d628a34a16398ccc4e41b5dc2a30N.dll
Resource
win10v2004-20240709-en
General
-
Target
12d6d628a34a16398ccc4e41b5dc2a30N.exe
-
Size
2.5MB
-
MD5
12d6d628a34a16398ccc4e41b5dc2a30
-
SHA1
9ef4dedb23b023667ddf6f03fa65c4d9f1f9eea8
-
SHA256
4f1752ea23c94fef90f66fd2cd5fa390cefbdc5a7205ca751ed1f6d975c6adf9
-
SHA512
fefd5a8ab8e6d42b9eaf324be4db2ced102c4614f3b1c103245ed66f30d7446ea84bee46210530046d4eaa9be63eb35827533b213e3481fb18ff464a237d9125
-
SSDEEP
49152:lw2or4hRAiCZHyDc69SJbpeceOTsi3nifaEJpsFXA:lwbr4hRAyOTskniPKFXA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12d6d628a34a16398ccc4e41b5dc2a30N.exe
Files
-
12d6d628a34a16398ccc4e41b5dc2a30N.exe.dll regsvr32 windows:6 windows x86 arch:x86
d0c1f9a21b7d2238438c52490dac93fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfplat
MFTRegister
MFCreateMediaType
MFCreateEventQueue
MFCreateMediaEvent
MFUnlockWorkQueue
MFAllocateSerialWorkQueue
MFPutWorkItem
MFCreateDXGIDeviceManager
MFCreateAttributes
MFCreateTrackedSample
MFCreateDXSurfaceBuffer
MFTUnregister
MFCreateMemoryBuffer
propsys
VariantCompare
PSCreateMemoryPropertyStore
PropVariantCompareEx
d3d11
D3D11CreateDevice
api-ms-win-core-path-l1-1-0
PathCchRemoveFileSpec
kernel32
DecodePointer
GetLastError
InitializeCriticalSectionEx
DeleteCriticalSection
GetCommandLineA
GetOEMCP
GetACP
GetCommandLineW
GetLocalTime
GetModuleFileNameW
IsValidCodePage
FindFirstFileExW
SetConsoleCtrlHandler
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
QueryPerformanceCounter
QueryPerformanceFrequency
GetProcessHeap
SetEndOfFile
HeapSize
GetCurrentProcess
GetCurrentThreadId
K32GetProcessMemoryInfo
WriteConsoleW
OutputDebugStringW
HeapDestroy
SetStdHandle
TzSpecificLocalTimeToSystemTime
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateEventW
CreateSemaphoreExW
WaitForMultipleObjects
GetProcessTimes
GetSystemInfo
LocalFree
SystemTimeToFileTime
ExitProcess
GetCurrentThread
HeapAlloc
HeapFree
GetStdHandle
WideCharToMultiByte
GetCurrentDirectoryW
SetCurrentDirectoryW
ReadConsoleW
ReadFile
SetFilePointerEx
HeapReAlloc
GetDateFormatW
GetFileSizeEx
GetTimeZoneInformation
GetModuleHandleExW
Sleep
MultiByteToWideChar
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
SetThreadErrorMode
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleW
SwitchToThread
GetTimeFormatW
IsValidLocale
GetFullPathNameW
SetFileTime
GetConsoleMode
GetConsoleCP
WaitForSingleObjectEx
FileTimeToSystemTime
WriteFile
RaiseException
CreateFileA
DeviceIoControl
GetSystemDirectoryA
VirtualAlloc
VirtualProtect
VirtualFree
VirtualQuery
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
FormatMessageA
FlushFileBuffers
EnumSystemLocalesW
SystemTimeToTzSpecificLocalTime
FormatMessageW
GetStringTypeW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
CreateThread
ExitThread
ResumeThread
FreeLibraryAndExitThread
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
GetUserDefaultLCID
ole32
PropVariantClear
CoInitializeEx
CoInitializeSecurity
StringFromCLSID
CoTaskMemFree
CoSetProxyBlanket
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
advapi32
RegGetValueW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteTreeW
RegEnumKeyExW
ConvertStringSidToSidW
BuildTrusteeWithSidW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
RegDeleteValueW
EventUnregister
RegSetValueExW
RegDeleteKeyExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
EventWrite
EventRegister
setupapi
CM_Get_Device_ID_List_SizeW
CM_Locate_DevNodeW
CM_Get_Device_ID_ListW
CM_Open_DevNode_Key
oleaut32
SysAllocString
SysAllocStringByteLen
VariantClear
SysFreeString
SysStringByteLen
VariantInit
dxgi
CreateDXGIFactory
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 310KB - Virtual size: 309KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ