D:\Workspace\p-520532d6e8094a40adf92e0dcfae1ebf\ConfigManager\Build\ConfigManagerDllx64s.pdb
Static task
static1
Behavioral task
behavioral1
Sample
11ea3e9924b54ddda1faae76a5fb50701ff33bf1d8dd7b0e2635992725f371d4.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
11ea3e9924b54ddda1faae76a5fb50701ff33bf1d8dd7b0e2635992725f371d4.dll
Resource
win10v2004-20240704-en
General
-
Target
11ea3e9924b54ddda1faae76a5fb50701ff33bf1d8dd7b0e2635992725f371d4
-
Size
685KB
-
MD5
3cafa1a82d4819782f9ceb8a388225f7
-
SHA1
98041252eeefc3cde586adc46d28a8fedda587e2
-
SHA256
11ea3e9924b54ddda1faae76a5fb50701ff33bf1d8dd7b0e2635992725f371d4
-
SHA512
c5b94f968219ebc54723a905c459703de5b6780a5179a59b6e329a37172412a866ce80ac8b9132725979566dbb8bfdddcaf39e3ef96fb3d7fdc86ba4176bb158
-
SSDEEP
12288:58T8POmA6pyohmwBjJHlc73fHFtR8bN1VR5bRnuuUYcngU0GB2akNkyV4Fqcm5Wr:/OmA6py0xhd/Fxz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11ea3e9924b54ddda1faae76a5fb50701ff33bf1d8dd7b0e2635992725f371d4
Files
-
11ea3e9924b54ddda1faae76a5fb50701ff33bf1d8dd7b0e2635992725f371d4.dll windows:5 windows x64 arch:x64
e82177797262dfe2fdb9c7212a617739
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
HeapFree
MultiByteToWideChar
RaiseException
GetLastError
DecodePointer
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
WaitForSingleObject
ReadFile
InitializeCriticalSection
CreateMutexA
OpenFileMappingA
MapViewOfFile
ReleaseMutex
UnmapViewOfFile
CreateFileMappingA
GetCurrentProcessId
CreateFileA
GetFileInformationByHandle
HeapAlloc
CreateEventW
SetEvent
ResetEvent
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
WriteFile
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetProcessHeap
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
GetModuleHandleW
GetProcAddress
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
GetStringTypeW
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
GetLocaleInfoW
GetCPInfo
OutputDebugStringW
RtlPcToFileHeader
RtlUnwindEx
FreeLibrary
LoadLibraryExW
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
HeapReAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
GetACP
GetStdHandle
GetFileType
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
CreateFileW
shlwapi
PathAppendA
PathAddExtensionA
winhttp
WinHttpOpenRequest
WinHttpConnect
WinHttpSendRequest
WinHttpOpen
WinHttpCheckPlatform
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpReadData
WinHttpCloseHandle
WinHttpSetTimeouts
iphlpapi
GetAdaptersAddresses
Sections
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tvm0 Size: 388KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ