C:\assemblage\Builds\8099591507671770079lyghupeqvh\YY.YellowDiagnostician-master\assemblage_outdir_bin\YY.YellowDiagnostician.WindowsWin32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aed74184ad62e80054abc62cb0d67541028f5cdad4c9a2eddd0b22d7a49af755.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aed74184ad62e80054abc62cb0d67541028f5cdad4c9a2eddd0b22d7a49af755.dll
Resource
win10v2004-20240802-en
General
-
Target
aed74184ad62e80054abc62cb0d67541028f5cdad4c9a2eddd0b22d7a49af755
-
Size
333KB
-
MD5
a1155e7b4e7fc6e4aef972bf51b7347f
-
SHA1
49cf41d71048ed84271dd4ad160c10a7104de632
-
SHA256
aed74184ad62e80054abc62cb0d67541028f5cdad4c9a2eddd0b22d7a49af755
-
SHA512
9f838a7bb397e589fb1591dc5b1741b23560d3c97f3728c2543786ae3b34fc05862d017ad9bd57bfcc80e96759b5b396d66c47e74c230a9d19b1e871d9314cf6
-
SSDEEP
6144:X+1jTYHJFGNxQptnRaUwt2rXKrynapc6AOzc5AG:X+1PYHJFGNxQt7wcb+pt+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aed74184ad62e80054abc62cb0d67541028f5cdad4c9a2eddd0b22d7a49af755
Files
-
aed74184ad62e80054abc62cb0d67541028f5cdad4c9a2eddd0b22d7a49af755.dll windows:6 windows x86 arch:x86
4baa0576837fa8bb8717b049bc264a19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentProcessId
GetModuleFileNameW
DeleteTimerQueue
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
GetLastError
SetEvent
GetThreadTimes
FreeLibrary
LoadLibraryExW
InterlockedFlushSList
RtlUnwind
RaiseException
GetACP
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapAlloc
HeapFree
IsValidCodePage
GetOEMCP
HeapReAlloc
GetStdHandle
GetFileType
GetTimeZoneInformation
FindClose
FindFirstFileExA
FindNextFileA
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
HeapSize
WriteConsoleW
advapi32
GetUserNameA
netapi32
NetGetDCName
Exports
Exports
DestroyObject
GetClassNames
GetClassObject
SetPlatformCapabilities
Sections
.text Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ