D:\a\ExplorerPatcher\ExplorerPatcher\build\Release\ep_gui.pdb
Static task
static1
Behavioral task
behavioral1
Sample
100d0331e8e1e8591b0577474ec11870N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
100d0331e8e1e8591b0577474ec11870N.dll
Resource
win10v2004-20240709-en
General
-
Target
100d0331e8e1e8591b0577474ec11870N.exe
-
Size
708KB
-
MD5
100d0331e8e1e8591b0577474ec11870
-
SHA1
de54dd36954271ca3b030c4ee0cbb6f5cbf2765b
-
SHA256
fc1c7ba18197818eecd7975898153825f116ef0f45e63349bb542115a0158e30
-
SHA512
65adb3a54c84de3f2d076fa65bba1b46434892522e784c5506e899ff6690776962ff660ecc6fbe053eec503d874178bcd589e0b27256649c38e9d8b82e4b59f6
-
SSDEEP
6144:qZdgIyFqL88QQbXEjdDxU7sKULur3sF32KKW3TQTRbCKez:NISqL8Kb0BMsKc9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 100d0331e8e1e8591b0577474ec11870N.exe
Files
-
100d0331e8e1e8591b0577474ec11870N.exe.dll windows:6 windows x64 arch:x64
bf6b7557478d742946b34387e3e4abf9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
DisableThreadLibraryCalls
RemoveVectoredExceptionHandler
FindFirstFileW
WriteFile
GetTimeFormatEx
GetModuleFileNameW
CompareStringOrdinal
FindClose
GetDateFormatEx
MultiByteToWideChar
SetEvent
GetCurrentThread
QueryPerformanceFrequency
LoadLibraryW
CreateThread
AddVectoredExceptionHandler
GetProcAddress
GetFileSize
FreeLibrary
SetThreadContext
QueryPerformanceCounter
GetTickCount
AllocConsole
LoadLibraryExW
WriteConsoleW
HeapSize
FlushFileBuffers
GetStringTypeW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
SetFilePointerEx
ReadConsoleW
K32EnumProcesses
SetStdHandle
LCMapStringW
GetExitCodeProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapAlloc
HeapFree
GetConsoleMode
GetConsoleOutputCP
GetStdHandle
GetModuleHandleExW
ExitProcess
GetFileType
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
SetLastError
InterlockedFlushSList
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
FindResourceW
LoadResource
FreeConsole
CloseHandle
DeleteFileW
LockResource
GetLastError
Sleep
CreateEventW
OpenProcess
FreeResource
GetSystemDirectoryW
GetProcessTimes
MulDiv
MapViewOfFile
CreateFileMappingW
GetModuleHandleW
CreateProcessW
GetCurrentProcessId
LocalFree
GetTempPathA
K32GetProcessImageFileNameW
GetWindowsDirectoryW
GetCurrentThreadId
CreateFileW
LocalAlloc
WaitForSingleObject
TerminateProcess
GetCurrentProcess
GetFileSizeEx
SizeofResource
ReadFile
CreateDirectoryW
SetThreadPreferredUILanguages
EnumResourceLanguagesW
GetUserPreferredUILanguages
GetLocaleInfoW
GetThreadPreferredUILanguages
GetTempFileNameA
SetEndOfFile
RtlUnwind
user32
KillTimer
wsprintfW
SetWindowsHookExW
GetAncestor
EnableWindow
MonitorFromWindow
GetDC
DestroyWindow
SendMessageTimeoutW
FindWindowExW
SetProcessDpiAwarenessContext
MapVirtualKeyW
PostMessageW
AllowSetForegroundWindow
GetKeyState
LoadCursorW
FindWindowW
LoadIconW
TranslateMessage
DestroyMenu
UnhookWindowsHookEx
SendDlgItemMessageW
FindWindowExA
GetSystemMenu
GetWindowLongW
TrackPopupMenuEx
GetDlgCtrlID
SetTimer
DispatchMessageW
GetActiveWindow
RegisterClassExW
GetWindowLongPtrW
CreatePopupMenu
CallNextHookEx
CreateWindowExW
SetWindowLongPtrW
GetDpiForWindow
MessageBoxW
SetWindowPos
InsertMenuItemW
ScreenToClient
SetWindowTextW
NotifyWinEvent
TrackPopupMenu
LoadStringW
ShowWindow
GetAsyncKeyState
GetMonitorInfoW
ClientToScreen
SwitchToThisWindow
SetMenuItemInfoW
RegisterClassW
GetDoubleClickTime
GetSysColor
SendNotifyMessageW
ToUnicode
SetWindowLongW
RemoveMenu
GetClientRect
DrawTextW
SetRect
DrawIconEx
PostQuitMessage
SystemParametersInfoForDpi
EnableMenuItem
GetMenuItemInfoA
SystemParametersInfoW
PtInRect
InvalidateRect
ReleaseDC
GetCursorPos
BeginPaint
EndPaint
GetWindowThreadProcessId
GetMessageW
GetMenuItemInfoW
DefWindowProcW
MonitorFromPoint
GetWindowRect
gdi32
SelectObject
SetTextColor
SetBkMode
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontIndirectW
ExtTextOutW
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
RegQueryValueW
RegOpenKeyExW
RegGetValueW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegSetKeyValueW
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegDeleteTreeW
RegDeleteKeyValueW
RegQueryInfoKeyW
RegDeleteKeyExW
shell32
SHAppBarMessage
SHGetFolderPathW
SHBindToParent
SHParseDisplayName
ShellExecuteExW
ShellExecuteW
ShellExecuteA
SHFileOperationW
Shell_NotifyIconW
ole32
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoInitializeEx
oleaut32
VariantClear
SysFreeString
VariantInit
rstrtmgr
RmRegisterResources
RmRestart
RmGetList
RmShutdown
RmEndSession
RmStartSession
version
VerQueryValueW
shlwapi
PathStripPathW
PathRemoveFileSpecW
api-ms-win-shcore-scaling-l1-1-1
GetDpiForMonitor
uxtheme
DrawThemeTextEx
OpenThemeData
EndBufferedPaint
IsThemeActive
BeginBufferedPaint
dwmapi
DwmIsCompositionEnabled
DwmGetWindowAttribute
DwmDefWindowProc
DwmExtendFrameIntoClientArea
DwmSetWindowAttribute
Exports
Exports
ZZGUI
ZZLaunchExplorer
ZZLaunchExplorerDelayed
ZZRestartExplorer
ZZTestBalloon
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 447KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ