adrclient.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8085c4e9f36ebe908370ea6ffb8a3250N.dll
Resource
win10v2004-20240802-en
General
-
Target
8085c4e9f36ebe908370ea6ffb8a3250N.exe
-
Size
133KB
-
MD5
8085c4e9f36ebe908370ea6ffb8a3250
-
SHA1
0ac87589cb1565a4d7e021e3347b587f68f437b0
-
SHA256
6cfe66c09e0a60f3be39d22620a94c1bc63a307548a49a67f9bd4fcc6d30e436
-
SHA512
d4e9348a8d8e61610df6474193e95ccd387ee879cb3693dcdd863ef21b427688edd59c4774365efadfb25104f697743dede0cc8957303286d0e1d5a7b9860c54
-
SSDEEP
3072:UyZ6ud9uOu7sx0l4vVBjCeLgOVvUV6yI:Ui7uQal4vVBjCeLA6y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8085c4e9f36ebe908370ea6ffb8a3250N.exe
Files
-
8085c4e9f36ebe908370ea6ffb8a3250N.exe.dll regsvr32 windows:10 windows x64 arch:x64
b57f63dc5beef574195e829f70626379
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
?what@exception@@UEBAPEBDXZ
__C_specific_handler
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
wcsncmp
_wcsnicmp
malloc
??0exception@@QEAA@AEBQEBDH@Z
??0exception@@QEAA@AEBV0@@Z
_callnewh
??3@YAXPEAX@Z
iswdigit
_vsnprintf
_snwscanf_s
_vsnwprintf
_CxxThrowException
_XcptFilter
_amsg_exit
_initterm
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
free
memmove
__CxxFrameHandler3
memcmp
_purecall
iswalpha
??_V@YAXPEAX@Z
memcpy
memset
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
SetLastError
UnhandledExceptionFilter
GetLastError
oleaut32
GetErrorInfo
SysStringLen
SysAllocString
LoadRegTypeLi
SysFreeString
api-ms-win-core-synch-l1-1-0
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
api-ms-win-core-libraryloader-l1-2-0
LoadStringW
GetModuleFileNameW
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
DisableThreadLibraryCalls
api-ms-win-core-heap-l1-1-0
HeapDestroy
api-ms-win-core-com-l1-1-0
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
api-ms-win-core-libraryloader-l1-2-1
LoadLibraryW
api-ms-win-core-debug-l1-1-0
OutputDebugStringA
api-ms-win-core-file-l1-1-0
GetDriveTypeW
mpr
WNetGetUniversalNameW
wkscli
NetGetJoinInformation
netutils
NetApiBufferFree
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcessId
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
GetCurrentThread
OpenThreadToken
OpenProcessToken
CreateThread
dfscli
NetDfsGetClientInfo
api-ms-win-security-base-l1-1-0
GetTokenInformation
CopySid
GetSecurityDescriptorOwner
GetLengthSid
GetFileSecurityW
api-ms-win-core-localization-l1-2-0
FormatMessageW
GetThreadLocale
ws2_32
GetAddrInfoW
WSAStartup
WSACleanup
FreeAddrInfoW
api-ms-win-core-heap-l2-1-0
LocalFree
LocalAlloc
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-rtlsupport-l1-1-0
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-sidebyside-l1-1-0
QueryActCtxW
DeactivateActCtx
CreateActCtxW
ActivateActCtx
FindActCtxSectionStringW
ntdll
WinSqmIsOptedIn
RtlFreeUnicodeString
WinSqmIncrementDWORD
RtlDosPathNameToNtPathName_U
NtOpenFile
user32
SendMessageW
shell32
ShellExecuteW
mi
MI_Application_InitializeV1
srmtrace
ord7
ord9
ord8
ord3
ord5
ord10
ord6
ord11
dui70
UnInitProcessPriv
?_ZeroRelease@Value@DirectUI@@AEAAXXZ
?SetValue@Element@DirectUI@@QEAAJP6APEBUPropertyInfo@2@XZHPEAVValue@2@@Z
?CreateString@Value@DirectUI@@SAPEAV12@PEBGPEAUHINSTANCE__@@@Z
?ContentProp@Element@DirectUI@@SAPEBUPropertyInfo@2@XZ
?EndDefer@Element@DirectUI@@QEAAXK@Z
?GetContentString@Element@DirectUI@@QEAAPEBGPEAPEAVValue@2@@Z
?Destroy@DUIXmlParser@DirectUI@@QEAAXXZ
CreateDUIWrapper
?CreateElement@DUIXmlParser@DirectUI@@QEAAJPEBGPEAVElement@2@1PEAKPEAPEAV32@@Z
?SetXMLFromResource@DUIXmlParser@DirectUI@@QEAAJIPEAUHINSTANCE__@@0@Z
?Create@DUIXmlParser@DirectUI@@SAJPEAPEAV12@P6APEAVValue@2@PEBGPEAX@Z2P6AX11H2@Z2@Z
UnInitThread
InitThread
StrToID
?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z
InitProcessPriv
api-ms-win-security-lsalookup-l2-1-0
LookupAccountSidW
api-ms-win-core-processenvironment-l1-1-0
GetCommandLineW
api-ms-win-security-sddl-l1-1-0
ConvertSidToStringSidW
api-ms-win-core-file-l2-1-0
GetFileInformationByHandleEx
api-ms-win-eventlog-legacy-l1-1-0
RegisterEventSourceW
DeregisterEventSource
ReportEventW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ