c:\standaloneapo_audkf-proxy\apodll\objfre_wlh_amd64\amd64\CX64Proxy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
CX64Proxy.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
CX64Proxy.dll
Resource
win10v2004-20240730-en
General
-
Target
CX64Proxy.dll
-
Size
3.2MB
-
MD5
a0e57c722dbdfbca6b442d781451ce79
-
SHA1
f9c8e0b2029243adf9574add54f3ff81a21e8dbe
-
SHA256
048660468e44dbddb5631f288a19060ac41cb82daf2802de46713dd8ed372b71
-
SHA512
ed5bac8bc12bc4c5896b5c78d0ed6a21b0f1659a509444f031eb116bdddcc540f33c48dd3fa300a587d8461471aaefdeb8572b74e3cc95e51bf46356d91027c6
-
SSDEEP
49152:rh+hzQ3iSX1EBDms+weXzFDmxw2IkhT54hki6RlLlLL3UmmQGl6qyF5:dyEiSlEB1lg9czi6RT3rmQGlVu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource CX64Proxy.dll
Files
-
CX64Proxy.dll.dll windows:6 windows x64 arch:x64
a2fe3925fc7533e8472bdcfd3ebbb39e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcscpy_s
wcstoul
_wcslwr_s
wcschr
memmove_s
pow
memmove
atan2f
cos
sin
log
sinh
log10f
sinf
cosf
_snwprintf_s
memset
__C_specific_handler
wcscat_s
strncmp
fwrite
fclose
fopen
sprintf
strncpy
strchr
strerror
_errno
_mkdir
_chdir
strcspn
wcsncpy_s
??_V@YAXPEAX@Z
??_U@YAPEAX_K@Z
??2@YAPEAX_K@Z
free
memcpy_s
_XcptFilter
_initterm
_amsg_exit
realloc
_unlock
??3@YAXPEAX@Z
__dllonexit
_lock
_onexit
tan
_purecall
malloc
memcpy
memcmp
_vsnwprintf
kernel32
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
lstrlenW
LoadResource
GetLastError
lstrcmpiW
SizeofResource
InitializeCriticalSection
LoadLibraryExW
DeleteCriticalSection
GetModuleFileNameW
EnterCriticalSection
RaiseException
GetModuleHandleW
FindResourceW
LeaveCriticalSection
FreeLibrary
MultiByteToWideChar
CreateFileMappingW
MapViewOfFile
SystemTimeToFileTime
GetCurrentProcessId
lstrcmpW
GetSystemTime
UnmapViewOfFile
CloseHandle
DuplicateHandle
Sleep
GetCurrentProcess
GetProcAddress
SetEvent
DisableThreadLibraryCalls
GetThreadLocale
SetThreadLocale
WaitForSingleObject
HeapFree
GetProcessHeap
HeapAlloc
LockResource
FindResourceExW
OutputDebugStringA
QueryPerformanceCounter
setupapi
SetupDiGetDeviceInterfaceDetailW
SetupDiOpenDevRegKey
SetupDiCreateDeviceInfoList
SetupDiOpenDeviceInterfaceW
SetupDiDestroyDeviceInfoList
ole32
CLSIDFromString
StringFromGUID2
PropVariantClear
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
SysStringLen
advapi32
RegQueryValueExW
RegEnumKeyExW
RegCloseKey
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegOpenKeyExW
RegOpenKeyW
TraceMessage
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegDeleteValueW
user32
CharNextW
UnregisterClassA
winmm
timeGetTime
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Exports
Exports
DllCanUnloadNow
Test
ClassObject
DllUnregisterServer
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
RT_CODE Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CODE Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RT_DATA Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RT_CONST Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ