C:\assemblage\Builds\1474501786030588028tfptahjbdw\DLLInject-main\DebugProj\TestAddDLL\assemblage_outdir_bin\TestAddDLL_d.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9c39409a41bf9fa5a1f7f295b0e0bc17ef70dd1560492a66cfb96c64e2a218bd.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9c39409a41bf9fa5a1f7f295b0e0bc17ef70dd1560492a66cfb96c64e2a218bd.dll
Resource
win10v2004-20240802-en
General
-
Target
9c39409a41bf9fa5a1f7f295b0e0bc17ef70dd1560492a66cfb96c64e2a218bd
-
Size
1.4MB
-
MD5
0f6f0359aea9e66e342a0f2e40998ada
-
SHA1
8e8421b9d8fc3cb552408a3ba093d6b74c013014
-
SHA256
9c39409a41bf9fa5a1f7f295b0e0bc17ef70dd1560492a66cfb96c64e2a218bd
-
SHA512
5b9291cded0b9215314a83282551a35710dd357ca630db0926d6bbc234d5a1dfea2edcb42230dae9ae9ac3ca1540796586bfac9ef0c956623275d9ee62dbccf2
-
SSDEEP
24576:P+WLxP0MbTAGh7bVCo2W0lvxOaxOOaZFTW9h6sbuZR+xX3IKR28SfbYAs9+azbdw:PvTaob+Vq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9c39409a41bf9fa5a1f7f295b0e0bc17ef70dd1560492a66cfb96c64e2a218bd
Files
-
9c39409a41bf9fa5a1f7f295b0e0bc17ef70dd1560492a66cfb96c64e2a218bd.dll windows:6 windows x64 arch:x64
4497a78c56c37e18f4107276e50af432
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThread
SetEndOfFile
ReadConsoleW
ReadFile
CreateFileW
SetStdHandle
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
GetStdHandle
GetCurrentDirectoryW
CloseHandle
GetLastError
GetCurrentProcess
GetProcessId
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileStringW
AllocConsole
FreeConsole
GetConsoleMode
SetConsoleMode
SetConsoleOutputCP
GetConsoleWindow
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjectsEx
CreateMutexW
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
CreatePrivateNamespaceW
OpenPrivateNamespaceW
ClosePrivateNamespace
CreateBoundaryDescriptorW
AddSIDToBoundaryDescriptor
DeleteBoundaryDescriptor
LocalFree
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
QueryPerformanceFrequency
SetFileInformationByHandle
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitOnceExecuteOnce
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetProcAddress
GetFileInformationByHandleEx
CreateSymbolicLinkW
FormatMessageA
SetLastError
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
VirtualQuery
VirtualProtectEx
VirtualQueryEx
GetModuleFileNameA
FreeLibrary
LoadLibraryExA
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RaiseException
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapFree
GetProcessHeap
RtlUnwindEx
RtlPcToFileHeader
InterlockedPushEntrySList
InterlockedFlushSList
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
HeapSize
HeapValidate
GetSystemInfo
ExitProcess
GetFileType
WriteFile
OutputDebugStringW
WriteConsoleW
SetConsoleCtrlHandler
GetTempPathW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetFileSizeEx
SetFilePointerEx
HeapReAlloc
HeapQueryInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwind
dbghelp
SymLoadModuleExW
SymEnumSymbolsW
SymFromNameW
SymUnloadModule64
SymInitializeW
SymSetSearchPathW
SymGetOptions
SymSetOptions
SymCleanup
user32
RemoveMenu
GetSystemMenu
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateWellKnownSid
Sections
.textbss Size: - Virtual size: 509KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 1024B - Virtual size: 671B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ