dplayx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
da3308f90efd198529e672644e7bd060N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
da3308f90efd198529e672644e7bd060N.dll
Resource
win10v2004-20240802-en
General
-
Target
da3308f90efd198529e672644e7bd060N.exe
-
Size
348KB
-
MD5
da3308f90efd198529e672644e7bd060
-
SHA1
dacafd5983282c2eaff134da746896672ede410a
-
SHA256
75301414fcd889c0e7631ca11cce2e6239841e3a594918f7295f54a982fa6e90
-
SHA512
4a2cf993cf1337f7a205be979c4415a6e0fb890864adc1f3f07427f4eceee69ad8ec55ff2b1627bb54e91084d7cac303f1aa2e2354b316fb8b07bd10c4fcdc2d
-
SSDEEP
6144:/Yq/CykeylTD8+dUYiskAo9/DftTG/TlbVU/Bc55kPydHmG5AKnIrf0bNFKihpPO:wc5Q/puWTjJnXbNA0sXg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da3308f90efd198529e672644e7bd060N.exe
Files
-
da3308f90efd198529e672644e7bd060N.exe.dll regsvr32 windows:6 windows x86 arch:x86
65198063b2463de11928873315bb4b9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_except_handler4_common
_amsg_exit
_initterm
free
_XcptFilter
srand
memmove
_vsnwprintf
_vsnprintf
memset
_memicmp
memcpy
malloc
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
UnmapViewOfFile
GetCurrentProcessId
CreateMutexA
CreateEventA
MapViewOfFile
GetLastError
CreateFileMappingA
ReleaseMutex
SetEvent
WaitForSingleObject
GetTickCount
CreateThread
ResetEvent
lstrlenA
Sleep
FreeLibrary
GetVersionExA
DuplicateHandle
GetCurrentProcess
LoadLibraryW
LoadLibraryA
InitializeCriticalSection
CreateEventW
CreateMutexW
CreateFileMappingW
OpenFileMappingW
OpenFileMappingA
CreateProcessW
CreateProcessA
GetCurrentDirectoryW
GetCurrentDirectoryA
DeleteCriticalSection
CompareStringA
GetProfileIntA
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
DisableThreadLibraryCalls
LocalFree
HeapAlloc
HeapFree
HeapReAlloc
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
ExitThread
WaitForMultipleObjects
OpenProcess
ResumeThread
TerminateProcess
GlobalFree
GlobalAlloc
ReleaseSemaphore
CreateSemaphoreA
InterlockedCompareExchange
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
CompareStringW
rpcrt4
UuidCreate
advapi32
RegOpenKeyA
RegQueryInfoKeyW
RegDeleteKeyA
RegDeleteKeyW
RegCreateKeyExA
RegCreateKeyExW
RegDeleteValueA
RegDeleteValueW
RegEnumValueA
RegEnumValueW
RegSetValueExA
RegSetValueExW
RegEnumKeyExA
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegLoadMUIStringW
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
winmm
timeGetDevCaps
timeKillEvent
timeSetEvent
timeGetTime
ntdll
ord1
Exports
Exports
DirectPlayCreate
DirectPlayEnumerate
DirectPlayEnumerateA
DirectPlayEnumerateW
DirectPlayLobbyCreateA
DirectPlayLobbyCreateW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gdwDPlaySPRefCount
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ