IEProxy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4be4762770d65c43114dbd95f536a690N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4be4762770d65c43114dbd95f536a690N.dll
Resource
win10v2004-20240709-en
General
-
Target
4be4762770d65c43114dbd95f536a690N.exe
-
Size
355KB
-
MD5
4be4762770d65c43114dbd95f536a690
-
SHA1
a92672d78447c7e24083058fa9dcb41411df75f1
-
SHA256
e3548ab20fd554b524828099267f6a7e92430bcc85146c0a93fc460b4c5f07b0
-
SHA512
ea8a27960be634072e2d646dfadf77a6752b3c1fe8ac62dc76af3f61cad7146657beb39b1d7ceca2700b78954aa271c64e1f27f3612b3f231db3581f42d402c7
-
SSDEEP
3072:9o7zf4n6H1PUkUBFWbfNRgyyx9Stm0eD4YLry2lQBV+UdE+rECWp7hKGK:9oX9HRDUBUhRgVsBV+UdvrEFp7hKGK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4be4762770d65c43114dbd95f536a690N.exe
Files
-
4be4762770d65c43114dbd95f536a690N.exe.dll regsvr32 windows:6 windows x86 arch:x86
5acb8b029df1e2348b1c657f73b55460
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_initterm
malloc
memcpy_s
_purecall
_XcptFilter
iswalpha
__CxxFrameHandler3
free
_amsg_exit
_except_handler4_common
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_vsnwprintf
wcsstr
wcschr
memcpy
memset
kernel32
CompareStringOrdinal
DelayLoadFailureHook
LoadLibraryExA
GetModuleHandleW
GetCurrentDirectoryW
DisableThreadLibraryCalls
FreeLibrary
LoadLibraryExW
GetProcAddress
GetLocaleInfoEx
Sleep
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
CompareStringW
RegCloseKey
RegOpenKeyExW
RegGetValueW
RegQueryValueExW
GetFinalPathNameByHandleW
LocalFree
LocalAlloc
CreateFileW
CloseHandle
GetVersionExA
GlobalSize
GlobalLock
GlobalAlloc
GlobalUnlock
GetLastError
api-ms-win-downlevel-shlwapi-l1-1-0
PathIsURLW
QISearch
UrlApplySchemeW
ParseURLW
UrlCreateFromPathW
UrlCanonicalizeW
PathCreateFromUrlW
rpcrt4
RpcRaiseException
NdrStubCall2
NdrStubForwardingFunction
NdrClientCall2
NdrOleFree
NdrGetUserMarshalInfo
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_DebugServerQueryInterface
IUnknown_QueryInterface_Proxy
CStdStubBuffer_CountRefs
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Disconnect
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_QueryInterface
NdrDllUnregisterProxy
NdrDllGetClassObject
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
NdrDllRegisterProxy
NdrCStdStubBuffer_Release
api-ms-win-downlevel-shlwapi-l2-1-0
IUnknown_QueryService
IUnknown_SetSite
api-ms-win-downlevel-advapi32-l1-1-0
GetSidSubAuthorityCount
GetSecurityDescriptorDacl
GetAce
GetSidIdentifierAuthority
GetSidSubAuthority
GetKernelObjectSecurity
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetProxyDllInfo
Sections
.orpc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ