dplayx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0ee637351bc550bf51cc359f9ba03da0N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ee637351bc550bf51cc359f9ba03da0N.dll
Resource
win10v2004-20240709-en
General
-
Target
0ee637351bc550bf51cc359f9ba03da0N.exe
-
Size
348KB
-
MD5
0ee637351bc550bf51cc359f9ba03da0
-
SHA1
173743c62f9197bec57c15190be783f9c463925f
-
SHA256
734b4d086983c9cd10d81bac3cead400c907de7beda44c56279dd17115e16cd2
-
SHA512
d384232b289f345d5c935135d5fe3b58ee2ca0c919099e802bb33a2b87a8141d3db246b108d2066ee1d41d6b2fd60c72064d2b585abaf26efc36be901b14e103
-
SSDEEP
6144:KVzTCykDplTD8+dUYKsAAo9/DvdThu37bVUTBc5tkPpdomGlAKNMrf0auUKihpuL:aL5buXiWYaJN7auhx5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ee637351bc550bf51cc359f9ba03da0N.exe
Files
-
0ee637351bc550bf51cc359f9ba03da0N.exe.dll regsvr32 windows:6 windows x86 arch:x86
65198063b2463de11928873315bb4b9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_except_handler4_common
_amsg_exit
_initterm
free
_XcptFilter
srand
memmove
_vsnwprintf
_vsnprintf
memset
_memicmp
memcpy
malloc
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
UnmapViewOfFile
GetCurrentProcessId
CreateMutexA
CreateEventA
MapViewOfFile
GetLastError
CreateFileMappingA
ReleaseMutex
SetEvent
WaitForSingleObject
GetTickCount
CreateThread
ResetEvent
lstrlenA
Sleep
FreeLibrary
GetVersionExA
DuplicateHandle
GetCurrentProcess
LoadLibraryW
LoadLibraryA
InitializeCriticalSection
CreateEventW
CreateMutexW
CreateFileMappingW
OpenFileMappingW
OpenFileMappingA
CreateProcessW
CreateProcessA
GetCurrentDirectoryW
GetCurrentDirectoryA
DeleteCriticalSection
CompareStringA
GetProfileIntA
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
DisableThreadLibraryCalls
LocalFree
HeapAlloc
HeapFree
HeapReAlloc
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
ExitThread
WaitForMultipleObjects
OpenProcess
ResumeThread
TerminateProcess
GlobalFree
GlobalAlloc
ReleaseSemaphore
CreateSemaphoreA
InterlockedCompareExchange
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
CompareStringW
rpcrt4
UuidCreate
advapi32
RegOpenKeyA
RegQueryInfoKeyW
RegDeleteKeyA
RegDeleteKeyW
RegCreateKeyExA
RegCreateKeyExW
RegDeleteValueA
RegDeleteValueW
RegEnumValueA
RegEnumValueW
RegSetValueExA
RegSetValueExW
RegEnumKeyExA
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegLoadMUIStringW
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
winmm
timeGetDevCaps
timeKillEvent
timeSetEvent
timeGetTime
ntdll
ord1
Exports
Exports
DirectPlayCreate
DirectPlayEnumerate
DirectPlayEnumerateA
DirectPlayEnumerateW
DirectPlayLobbyCreateA
DirectPlayLobbyCreateW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gdwDPlaySPRefCount
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ