msrepl40.pdb
Static task
static1
Behavioral task
behavioral1
Sample
606a53170db6a2249887f239124ce7a0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
606a53170db6a2249887f239124ce7a0N.dll
Resource
win10v2004-20240709-en
General
-
Target
606a53170db6a2249887f239124ce7a0N.exe
-
Size
1.6MB
-
MD5
606a53170db6a2249887f239124ce7a0
-
SHA1
7419d409788a1e820531941b47e53f1c5ad7a896
-
SHA256
b223aa6993698123135f935d5e8504664b27fe03bf8ad6286bccd4d13b885539
-
SHA512
5c4378820bcb4e1a059d9452a4176b3f6aa1c203c94ea2bb13ca3d261b900c5ece7db631c8d67aa5e3befecd00d250e29f11853a0875402cfcd7a4c267285281
-
SSDEEP
12288:2YnSoofHtn9AwCCS7/9grkTRR7ZzqKkE4/AwnxvqmmBCTZQlyl7n9a:29vF6ZeAwnxklytU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 606a53170db6a2249887f239124ce7a0N.exe
Files
-
606a53170db6a2249887f239124ce7a0N.exe.dll windows:6 windows x86 arch:x86
35ce06e0847a783203858e6667924396
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msjet40
ord138
ord145
ord107
ord157
ord112
ord108
ord180
ord136
ord1101
ord156
ord167
ord908
ord140
ord176
ord912
ord129
ord130
msjter40
ord4
ord3
ord5
advapi32
RegDeleteKeyA
RegFlushKey
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegEnumValueW
RegEnumValueA
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegEnumKeyA
kernel32
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CompareStringW
LCMapStringW
HeapReAlloc
HeapSize
SetStdHandle
WriteConsoleW
SetEnvironmentVariableA
GetFileType
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetComputerNameW
CreateFileA
DeleteFileA
CloseHandle
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
DisableThreadLibraryCalls
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempPathA
CreateFileW
DeleteFileW
FindFirstFileA
FindFirstFileW
GetDriveTypeA
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
GetShortPathNameW
GetTempFileNameW
GetTempPathW
SetLastError
CreateEventA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExA
LoadLibraryExW
GetShortPathNameA
GetTempFileNameA
CopyFileA
CopyFileW
MoveFileA
MoveFileW
GetComputerNameA
GetTimeZoneInformation
MultiByteToWideChar
WideCharToMultiByte
FindClose
Sleep
GetEnvironmentVariableA
GetFileSize
ReadFile
WriteFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
CreateProcessA
OpenProcess
CreateThread
TerminateThread
SuspendThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
SetEvent
ResetEvent
ReleaseMutex
WaitForSingleObject
CreateMutexA
OpenEventA
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
WaitForMultipleObjects
OpenMutexA
CreateFileMappingA
OpenFileMappingA
GetStdHandle
GetCurrentProcessId
HeapFree
HeapAlloc
GetStringTypeW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCommandLineA
GetCurrentThreadId
GetProcessHeap
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
OutputDebugStringW
ole32
CoUninitialize
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoInitialize
IIDFromString
user32
CharUpperW
PeekMessageA
CharUpperA
Sections
.text Size: 564KB - Virtual size: 563KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ