d:\toolsgit\swds\BldTmp_VC9\Exec\IFL_SWD.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f9c6aad6a2d3a1b8531710e20245adce3d5014bc72acab3f8b34e29eb891456c.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f9c6aad6a2d3a1b8531710e20245adce3d5014bc72acab3f8b34e29eb891456c.dll
Resource
win10v2004-20240802-en
General
-
Target
f9c6aad6a2d3a1b8531710e20245adce3d5014bc72acab3f8b34e29eb891456c
-
Size
5.2MB
-
MD5
8dfa45835bae2c9ac6454087a5e23f16
-
SHA1
559f1153d46b0034870e0af22cc2c70f5488b8f0
-
SHA256
f9c6aad6a2d3a1b8531710e20245adce3d5014bc72acab3f8b34e29eb891456c
-
SHA512
7d9a627c98d3abe140d2c4071064211d61d5eac674c1305fe0ee5da4f26423cd36e159367ff3e41cbebc90320021a0762794c079ffdf51936884e10686dcb54e
-
SSDEEP
49152:slRhfccXk02tIz1IPQErO9JjvELxWflBCCCWH40VDl:slvfNX12tIz1IPQErUGxWf/CwH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9c6aad6a2d3a1b8531710e20245adce3d5014bc72acab3f8b34e29eb891456c
Files
-
f9c6aad6a2d3a1b8531710e20245adce3d5014bc72acab3f8b34e29eb891456c.dll windows:5 windows x86 arch:x86
9ac1ab3df85cd0dfa9d55f9d100a9587
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThread
GetFileAttributesExW
LocalFileTimeToFileTime
SetFileTime
GetFileSizeEx
GetFileTime
GetPrivateProfileIntW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetCurrentDirectoryW
GetSystemDirectoryW
InterlockedCompareExchange
Sleep
GetLocaleInfoA
CreateFileA
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCPInfo
HeapAlloc
ExitProcess
GetDriveTypeW
SetEnvironmentVariableW
SetCurrentDirectoryW
FindFirstFileA
FindNextFileA
GetCommandLineA
RaiseException
RtlUnwind
HeapReAlloc
ExitThread
CreateThread
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
GetTimeFormatA
ConvertDefaultLocale
GetConsoleCP
GetConsoleMode
FatalAppExitA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
HeapDestroy
GetStringTypeA
GetModuleFileNameA
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetCurrentDirectoryA
SetCurrentDirectoryA
GetDriveTypeA
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
GetShortPathNameW
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
lstrcmpiW
GetStringTypeExW
GetModuleHandleA
GlobalFlags
FreeResource
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
LoadLibraryA
lstrcmpW
GetVersionExA
CompareStringW
InterlockedIncrement
SystemTimeToFileTime
GetThreadLocale
lstrlenA
lstrcmpA
GetAtomNameW
GlobalGetAtomNameW
SetErrorMode
CreateEventW
SuspendThread
SetEvent
GetCurrentThreadId
ResumeThread
SetThreadPriority
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedDecrement
GetModuleHandleW
GlobalFree
CopyFileW
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
lstrlenW
GetCurrentProcessId
SetLastError
GetDiskFreeSpaceExW
WideCharToMultiByte
SetFileAttributesW
LocalFree
DeleteFileW
CloseHandle
CreatePipe
RemoveDirectoryW
LockResource
MoveFileW
LocalLock
GetProcAddress
GetLastError
MultiByteToWideChar
CreateFileW
GetModuleFileNameW
ReadFile
TerminateProcess
GetFileAttributesW
GetExitCodeProcess
FormatMessageW
GetConsoleWindow
SizeofResource
LoadLibraryW
WaitForSingleObject
CreateDirectoryW
CreateProcessW
LoadResource
FreeLibrary
FindResourceW
GetFileSize
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetDateFormatA
InitializeCriticalSection
user32
IsRectEmpty
GetSystemMenu
SetParent
UnionRect
GetDCEx
LockWindowUpdate
SetCapture
TranslateAcceleratorW
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
DeleteMenu
ShowOwnedPopups
SetCursor
InvalidateRect
SetRectEmpty
PostQuitMessage
SystemParametersInfoW
DestroyMenu
GetMenuItemInfoW
InflateRect
CharUpperW
DestroyIcon
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
GetDesktopWindow
ClientToScreen
ScrollWindowEx
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
IsDlgButtonChecked
SetDlgItemTextW
SetDlgItemInt
GetDlgItemTextW
GetDlgItemInt
CheckRadioButton
CheckDlgButton
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
MapVirtualKeyW
IsWindow
SetFocus
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
MapWindowPoints
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
GetClientRect
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
MessageBoxW
EnableWindow
IsWindowEnabled
GetLastActivePopup
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetKeyNameTextW
GetDialogBaseUnits
WindowFromPoint
KillTimer
SetTimer
SetRect
UnpackDDElParam
ReuseDDElParam
LoadMenuW
GetMenuBarInfo
ReleaseCapture
LoadAcceleratorsW
InsertMenuItemW
CreatePopupMenu
RemovePropW
BringWindowToTop
GetWindowLongW
GetParent
SendMessageW
GetWindowThreadProcessId
RemoveMenu
GetSubMenu
GetMenuItemCount
InsertMenuW
GetMenuItemID
AppendMenuW
GetMenuStringW
GetMenuState
UnhookWindowsHookEx
ValidateRect
GetCursorPos
PeekMessageW
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextLengthW
GetWindowTextW
UnregisterClassW
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
GetMessagePos
gdi32
PolylineTo
PolyBezierTo
ExtSelectClipRgn
RectVisible
DeleteDC
CreateDIBPatternBrushPt
CreatePatternBrush
CreateCompatibleDC
GetStockObject
SelectPalette
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
CreatePen
ExtCreatePen
PolyDraw
CreateHatchBrush
CreateFontIndirectW
GetTextExtentPoint32W
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
PatBlt
DPtoLP
GetCharWidthW
CreateFontW
StretchDIBits
CreateCompatibleBitmap
GetBkColor
GetTextMetricsW
GetCurrentPositionEx
ArcTo
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
CreateSolidBrush
GetDeviceCaps
PtVisible
StartDocW
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
SelectClipPath
CreateRectRgn
GetClipRgn
SelectClipRgn
SetColorAdjustment
SetArcDirection
SetMapperFlags
SetTextCharacterExtra
SetTextJustification
SetTextAlign
MoveToEx
LineTo
OffsetClipRgn
IntersectClipRect
ExcludeClipRect
SetMapMode
ModifyWorldTransform
SetWorldTransform
SetGraphicsMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
GetObjectW
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
CreateBitmap
CreateDCW
CopyMetaFileW
TextOutW
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegDeleteValueW
RegSetValueExW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueW
RegOpenKeyExW
RegOpenKeyW
RegCreateKeyW
RegCreateKeyExW
RegSetValueW
RegCloseKey
RegQueryValueExW
shell32
SHFileOperationW
SHGetFileInfoW
DragFinish
DragQueryFileW
ExtractIconW
shlwapi
PathFindFileNameW
PathRelativePathToW
PathFindExtensionW
PathRemoveExtensionW
PathStripToRootW
PathIsUNCW
PathIsRelativeW
PathCombineW
PathRemoveFileSpecW
ole32
StringFromGUID2
CoCreateInstance
OleDuplicateData
CoTreatAsClass
StringFromCLSID
CoTaskMemAlloc
ReleaseStgMedium
CLSIDFromString
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
SetConvertStg
CoTaskMemFree
CoDisconnectObject
CoUninitialize
CoInitializeEx
CreateBindCtx
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
SysStringByteLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantClear
SafeArrayRedim
VariantChangeType
VariantCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayCopy
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
VarDateFromStr
SysReAllocStringLen
VarCyFromStr
VarBstrFromCy
VarBstrFromDec
VarDecFromStr
VarBstrFromDate
RegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VariantInit
Exports
Exports
BuildTimWithTimNoDSandSignedFile
DoFBFMakeforSplitImage
DownloadWithPackage
FBFMake
FreeInstanceParams
GenerateDKBTimNoDSandTimHashFiles
GenerateDtimPublicKeyCompFile
GenerateFBFTimNoDSandTimHashFiles
GenerateTimNoDSandTimHashFiles
GetEraseFlashStatus
MakeDownloadPackage
MakeDownloadPackageWithAllExistImages
MallocInstanceParams
NTimBuilder
PrepareDownloadWithFBF
PrepareJtagImages
PrepareUpload
RNDBuilder
RNDParser
ReadBLF
SetEraseFlashStatus
SetMode
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 287KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.1MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ