msltus40.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67e6d6615112c6530cf781556da3b3659d67962041986b43e95ab714ea7c7fe9.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
67e6d6615112c6530cf781556da3b3659d67962041986b43e95ab714ea7c7fe9.dll
Resource
win10v2004-20240802-en
General
-
Target
67e6d6615112c6530cf781556da3b3659d67962041986b43e95ab714ea7c7fe9
-
Size
371KB
-
MD5
b3f5b441bec76ea86f852c4bd9870bc9
-
SHA1
30904231d3ca4f138a91e6696e2060ae63947454
-
SHA256
67e6d6615112c6530cf781556da3b3659d67962041986b43e95ab714ea7c7fe9
-
SHA512
bbaccc1c46f4a58759f09f4720699c1bf8de1e17cc3aba37c109449e4532a98607888220f819a20e369878fe4916fd3ab018ad12460b947b13c9bb2a74d5a56f
-
SSDEEP
6144:xJj5QDvgGBC/6o0C3B818Y1E3XPYpVarihpdT02K:xQ7gGBC/D32180EPiVxAF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67e6d6615112c6530cf781556da3b3659d67962041986b43e95ab714ea7c7fe9
Files
-
67e6d6615112c6530cf781556da3b3659d67962041986b43e95ab714ea7c7fe9.dll regsvr32 windows:6 windows x86 arch:x86
f20127490c58090f4fb5a3ffb75e9d54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msjet40
ord172
ord118
ord101
ord145
ord159
ord176
ord179
ord108
ord136
mswstr10
ord1
advapi32
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
kernel32
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
OutputDebugStringW
RtlUnwind
HeapSize
SetStdHandle
WriteConsoleW
FlushFileBuffers
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
GetProcAddress
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetACP
DisableThreadLibraryCalls
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FileTimeToLocalFileTime
FindClose
ReadFile
SetFilePointer
WriteFile
CloseHandle
FileTimeToDosDateTime
GetCurrentProcessId
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
RemoveDirectoryA
RemoveDirectoryW
GetTempPathW
SetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExA
LoadLibraryExW
GetPrivateProfileStringA
GetPrivateProfileStringW
WritePrivateProfileStringA
WritePrivateProfileStringW
GetTempPathA
GetStringTypeW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
GetCommandLineA
GetCurrentThreadId
IsValidCodePage
GetOEMCP
GetCPInfo
EncodePointer
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
RaiseException
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetStdHandle
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
oleaut32
VarDecFromR8
SysFreeString
VarR8FromStr
VarR8FromDec
VarBstrFromR8
VarI2FromStr
SysAllocStringLen
user32
CharUpperW
CharUpperA
Exports
Exports
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ