e:\po\trunk\modules\workflow\Release\workflow32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
226d9466d8715a6e728c67f1e3d647edaf0643210c6efeca68e35749c3f41598.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
226d9466d8715a6e728c67f1e3d647edaf0643210c6efeca68e35749c3f41598.dll
Resource
win10v2004-20240802-en
General
-
Target
226d9466d8715a6e728c67f1e3d647edaf0643210c6efeca68e35749c3f41598
-
Size
269KB
-
MD5
5e0ac4df4f158020d9d0d6445897a10f
-
SHA1
9ebc6a9d6461f91357189c85152af4c0a81f3418
-
SHA256
226d9466d8715a6e728c67f1e3d647edaf0643210c6efeca68e35749c3f41598
-
SHA512
2423263c2ec71fb2d257ca21ccc19406f7ffb6f1d382d663da2311fd58266b87a98830eec9f963d394ffb4e7d3987ed5c2bc4d4453adbaadfc797b17d54586c5
-
SSDEEP
6144:6DRsZI+ErNW5atWnMFBLToX/VUS/HTt80njPmX2pnHSA:6DReI+ErqdnWBLToX/Vb/HTtrnjPmQHZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 226d9466d8715a6e728c67f1e3d647edaf0643210c6efeca68e35749c3f41598
Files
-
226d9466d8715a6e728c67f1e3d647edaf0643210c6efeca68e35749c3f41598.dll windows:5 windows x86 arch:x86
309f4edf204e097a6739a58b7ec1e0ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateEventW
SetLastError
GetLastError
GetTempPathW
Sleep
CloseHandle
ResetEvent
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
CreateEventA
SetEvent
WaitForSingleObject
GetLocalTime
DisableThreadLibraryCalls
OutputDebugStringW
lstrcmpA
CreateFileA
lstrlenA
VirtualQuery
SetEndOfFile
CreateProcessW
HeapAlloc
SystemTimeToFileTime
GetCurrentProcess
HeapFree
GetModuleHandleW
GetTickCount
GetProcessHeap
WriteFile
InitializeCriticalSection
OpenProcess
WideCharToMultiByte
LeaveCriticalSection
lstrcpynW
GetFileAttributesW
TerminateProcess
FileTimeToSystemTime
ReadFile
GetModuleFileNameW
CreateFileW
GetACP
MultiByteToWideChar
lstrlenW
GetProcAddress
EnterCriticalSection
LoadLibraryA
Process32FirstW
ProcessIdToSessionId
Module32FirstW
Process32NextW
lstrcmpiW
GetModuleHandleA
CreateToolhelp32Snapshot
GetFileAttributesExW
OpenEventW
Module32NextW
DeleteFileW
GetCurrentProcessId
LocalFree
lstrcpyW
lstrcpyA
GetCurrentThreadId
CreateThread
GetWindowsDirectoryW
SetFilePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
RaiseException
RtlUnwind
HeapReAlloc
GetSystemTimeAsFileTime
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetStdHandle
GetModuleFileNameA
HeapSize
ExitProcess
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
VirtualAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetLocaleInfoW
GetLocaleInfoA
InterlockedExchange
InitializeCriticalSectionAndSpinCount
shlwapi
SHDeleteValueW
wnsprintfW
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
SHGetValueW
SHSetValueW
StrChrA
wnsprintfA
wvnsprintfA
PathIsDirectoryW
wvnsprintfW
PathFindFileNameW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
advapi32
CreateProcessAsUserW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
FreeSid
RegEnumValueW
SetEntriesInAclW
AllocateAndInitializeSid
SetFileSecurityW
shell32
ord165
ole32
CoCreateGuid
Sections
.text Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ