C:\Users\user\Desktop\drop-side\VisualStudioProject\winhttp.dll\x64\Release\winhttp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
msi.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
msi.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
pdf_20240615_00003645.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
pdf_20240615_00003645.exe
Resource
win10v2004-20240709-en
General
-
Target
down.rar
-
Size
2.1MB
-
MD5
d7b236fdb94b476898ac59e132885016
-
SHA1
64edf57c3669d8e9332ad1bb844adcc66b5f36aa
-
SHA256
f97df4ddd33b29502f41d34ca757ef5da4935fcea8f7cd1e49bc4fbc5a367057
-
SHA512
f5ddb6b2c8c717a1fbe121a4c2b16ac5a1c684523b13a41d66fc63107af45ab0f92ee1faa1364648106fe3c5c4d4e406e4c66480a3ee03d33e0762cc527bcc18
-
SSDEEP
49152:XkS89K6uD66ApMhU3Rr7AiLBbf95jvAmNE5w:n8ZuD66ApuodAiVzbnNCw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/msi.dll
Files
-
down.rar.rar
-
msi.dll.dll windows:6 windows x64 arch:x64
98d9eef93d4414303caa764223cb12e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LocalAlloc
LoadLibraryW
GetCurrentDirectoryW
LocalFree
LocalReAlloc
WriteConsoleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
CloseHandle
Exports
Exports
??0Cwinhttpdll@@QEAA@XZ
??4Cwinhttpdll@@QEAAAEAV0@$$QEAV0@@Z
??4Cwinhttpdll@@QEAAAEAV0@AEBV0@@Z
?fnwinhttpdll@@YAHXZ
?nwinhttpdll@@3HA
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 289KB - Virtual size: 289KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
pdf_20240615_00003645.exe.exe windows:6 windows x64 arch:x64
101011039347c4cfa1069b986fd6a64e
Code Sign
33:00:00:05:57:cf:90:dd:c7:d1:c0:88:8c:00:00:00:00:05:57Certificate
IssuerCN=Microsoft Code Signing PCA 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before19/10/2023, 19:51Not After16/10/2024, 19:51SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0c:52:4c:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before06/07/2010, 20:40Not After06/07/2025, 20:50SubjectCN=Microsoft Code Signing PCA 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:03:a5:41:11:e8:f0:7f:be:0b:75:00:00:00:00:03:a5Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before19/10/2023, 19:51Not After16/10/2024, 19:51SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
fb:cf:9a:9b:9c:d8:67:e1:58:13:62:4c:85:5c:78:bb:dd:a6:0b:c4:d9:c3:c6:b2:c3:ab:66:e2:04:bd:1e:7bSigner
Actual PE Digestfb:cf:9a:9b:9c:d8:67:e1:58:13:62:4c:85:5c:78:bb:dd:a6:0b:c4:d9:c3:c6:b2:c3:ab:66:e2:04:bd:1e:7bDigest Algorithmsha256PE Digest Matchestruefb:cf:9a:9b:9c:d8:67:e1:58:13:62:4c:85:5c:78:bb:dd:a6:0b:c4:d9:c3:c6:b2:c3:ab:66:e2:04:bd:1e:7bSigner
Actual PE Digestfb:cf:9a:9b:9c:d8:67:e1:58:13:62:4c:85:5c:78:bb:dd:a6:0b:c4:d9:c3:c6:b2:c3:ab:66:e2:04:bd:1e:7bDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
d:\dbs\el\omr\target\x64\ship\click2run\x-none\IntegratedOffice.pdb
Imports
advapi32
RegCreateKeyExW
RegCloseKey
EventUnregister
EventRegister
EventWriteTransfer
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExW
RegDeleteTreeW
RegDeleteKeyW
RegGetValueW
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
GetTokenInformation
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenThreadToken
OpenProcessToken
GetLengthSid
CopySid
InitializeAcl
AddAccessAllowedAce
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
ConvertSidToStringSidA
CheckTokenMembership
CreateWellKnownSid
EqualSid
RevertToSelf
RegEnumValueA
RegDeleteValueA
RegGetValueA
RegNotifyChangeKeyValue
EventWrite
ole32
CoUninitialize
CreateStreamOnHGlobal
CoInitialize
IIDFromString
CoTaskMemAlloc
CoCreateFreeThreadedMarshaler
CLSIDFromString
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
StringFromGUID2
CoCreateGuid
CoInitializeEx
oleaut32
VariantClear
VariantInit
gdi32
GetDeviceCaps
iphlpapi
GetAdaptersInfo
kernel32
GetCommandLineA
SetStdHandle
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetOEMCP
ExitProcess
GetStdHandle
FreeLibraryAndExitThread
ExitThread
GetConsoleOutputCP
ReadConsoleW
GetCommandLineW
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
SetEnvironmentVariableW
GetCurrentProcess
GetModuleHandleExW
GetLastError
CompareStringEx
GetProcAddress
FreeLibrary
IsWow64Process
MultiByteToWideChar
InitializeCriticalSectionEx
DeleteCriticalSection
DecodePointer
SetLastError
DeactivateActCtx
ActivateActCtx
LoadLibraryW
FindActCtxSectionStringW
CreateActCtxW
GetModuleFileNameW
QueryActCtxW
OutputDebugStringA
LocalFree
FindClose
UnmapViewOfFile
CreateFileA
CloseHandle
CreateFileMappingA
GetFileSize
MapViewOfFile
Sleep
GetStringTypeExW
GetUserDefaultLCID
LoadLibraryA
LCMapStringW
FormatMessageA
LocalAlloc
CreateEventExW
GlobalMemoryStatusEx
RaiseException
LoadLibraryExW
GetModuleHandleW
VerSetConditionMask
VerifyVersionInfoW
GetVersionExW
WideCharToMultiByte
InitializeSRWLock
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
AcquireSRWLockShared
ReleaseSRWLockShared
OpenProcess
GetExitCodeProcess
GetProcessTimes
GetTickCount64
GetSystemTimeAsFileTime
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
CreateProcessW
FindResourceW
SizeofResource
LoadResource
GetCurrentProcessId
GetUserDefaultLocaleName
IsValidCodePage
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
GetCPInfoExW
GetDiskFreeSpaceExW
CreateFileW
WriteConsoleW
GetComputerNameW
FormatMessageW
GetLogicalProcessorInformation
GetNativeSystemInfo
GetSystemDirectoryW
HeapFree
HeapAlloc
GetProcessHeap
ReleaseMutex
CreateMutexExW
OpenMutexW
WaitForSingleObjectEx
EnterCriticalSection
GetCurrentThreadId
TryEnterCriticalSection
LeaveCriticalSection
SetEvent
FlsFree
FlsAlloc
GetFileAttributesExW
CreateDirectoryW
FindFirstFileExW
DeleteFileW
FindFirstFileW
FindNextFileW
GetFileTime
ReadFile
GetFileSizeEx
SetFilePointerEx
GetTempFileNameW
GetFileAttributesW
CreateFileMappingW
FlushViewOfFile
GetFileType
SetFilePointer
GetOverlappedResult
SetFileInformationByHandle
GetTempPathW
ExpandEnvironmentStringsW
GetFullPathNameW
CreateMutexW
ReleaseSemaphore
WaitForMultipleObjects
GetCurrentThread
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
OpenSemaphoreA
CreateSemaphoreA
OpenFileMappingA
GlobalAlloc
GlobalFree
WaitForMultipleObjectsEx
GetProcessAffinityMask
CreateWaitableTimerW
SetWaitableTimerEx
CancelWaitableTimer
QueryDepthSList
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
RtlCaptureStackBackTrace
DeleteFileA
GetTempPathA
ProcessIdToSessionId
GetExitCodeThread
WriteFile
GetPriorityClass
GetTimeZoneInformation
IsValidLocale
GetTickCount
ResetEvent
CreateEventW
WaitForSingleObject
CreateThread
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
CloseThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CreateThreadpoolWait
CreateThreadpoolWork
SubmitThreadpoolWork
GetLocaleInfoEx
LCIDToLocaleName
LocaleNameToLCID
GetLocaleInfoW
ResolveLocaleName
GetUserPreferredUILanguages
GetACP
LockResource
EnumSystemLocalesEx
GetSystemDefaultLocaleName
GetFileAttributesA
LoadLibraryExA
LCMapStringEx
GetSystemDefaultLCID
GetUserGeoID
GetLongPathNameW
GetFinalPathNameByHandleW
GetSystemPowerStatus
AreFileApisANSI
HeapCreate
GetDiskFreeSpaceW
LockFile
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
UnlockFileEx
HeapValidate
HeapSize
GetDiskFreeSpaceA
OutputDebugStringW
HeapReAlloc
GetSystemInfo
HeapCompact
HeapDestroy
UnlockFile
LockFileEx
QueryPerformanceCounter
FlushFileBuffers
K32GetProcessMemoryInfo
SetFileTime
CancelIoEx
GetPhysicallyInstalledSystemMemory
GetProductInfo
QueryPerformanceFrequency
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
QueryFullProcessImageNameW
CreateIoCompletionPort
PostQueuedCompletionStatus
GetThreadIOPendingFlag
GetQueuedCompletionStatus
FlsSetValue
FlsGetValue
IsDebuggerPresent
GetStartupInfoW
CreateMemoryResourceNotification
IsSystemResumeAutomatic
QueryUnbiasedInterruptTime
RtlCaptureContext
SwitchToThread
VirtualProtect
VirtualQuery
GetLocalTime
DeviceIoControl
EncodePointer
InitializeConditionVariable
GetFileInformationByHandleEx
TryAcquireSRWLockExclusive
InitOnceBeginInitialize
InitOnceComplete
GetStringTypeW
RtlPcToFileHeader
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 82KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ