mstext40.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b82899fcfd19b52431442b5c30946c40N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b82899fcfd19b52431442b5c30946c40N.dll
Resource
win10v2004-20240709-en
General
-
Target
b82899fcfd19b52431442b5c30946c40N.exe
-
Size
406KB
-
MD5
b82899fcfd19b52431442b5c30946c40
-
SHA1
c5aaa3148197ab55a408f8a74ef9a5742c8c5e31
-
SHA256
9bb4ab08f32217668397ccc91cd4d9dcf5b415afa8e62c3b41d115aee4a0afbf
-
SHA512
96b4b9966c62d6e1cf22f6cbfd7277bfcf89b84e26da45998e85d63e79fa5d66b516a51679e87c8611d2c0456a8dbc0a0fa80ad6fc8cfe090e4c62e310ff01cd
-
SSDEEP
6144:1lKrwBGXctzr/j8Yu+FD+lD0KXl42IXSwMf/nOw456RIihpe7LJ:br/Ublu2SSRf/nP456AP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b82899fcfd19b52431442b5c30946c40N.exe
Files
-
b82899fcfd19b52431442b5c30946c40N.exe.dll regsvr32 windows:6 windows x86 arch:x86
adf0e3752c843589d86647f772a64579
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msjet40
ord108
ord158
ord167
ord159
ord172
ord179
ord136
ord101
ord118
ord176
ord170
ord155
ord156
ord173
ord146
mswstr10
ord1
kernel32
GetOEMCP
GetUserDefaultLCID
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FileTimeToLocalFileTime
FindClose
GetFileTime
ReadFile
SetFilePointer
WriteFile
CloseHandle
GetLastError
FileTimeToDosDateTime
GetCurrentProcessId
GetPrivateProfileStringA
DisableThreadLibraryCalls
GetModuleFileNameA
LoadLibraryExA
WritePrivateProfileStringA
GetFileSize
LoadLibraryW
GetStringTypeW
GetStringTypeA
IsValidCodePage
GetLocaleInfoA
GetSystemDefaultLangID
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
RemoveDirectoryA
RemoveDirectoryW
GetTempPathW
GetACP
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
GetTempPathA
GetProcAddress
GetLocaleInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
GetCommandLineA
GetCurrentThreadId
GetCPInfo
EncodePointer
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetStdHandle
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
RaiseException
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapReAlloc
OutputDebugStringW
RtlUnwind
SetStdHandle
WriteConsoleW
HeapSize
ReadConsoleW
FlushFileBuffers
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
SetLastError
user32
CharUpperW
CharUpperA
advapi32
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegCloseKey
RegOpenKeyExA
oleaut32
SysAllocStringLen
VarI2FromStr
SysFreeString
SysStringByteLen
VarBstrFromDec
VarDecFromStr
SysAllocString
Exports
Exports
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ