D3DCompiler_37.pdb
Static task
static1
Behavioral task
behavioral1
Sample
de35c0635e0f208d936f95bc0302c4c24b1551e9c6ebaeb6064f0ea47d1a0e93.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de35c0635e0f208d936f95bc0302c4c24b1551e9c6ebaeb6064f0ea47d1a0e93.dll
Resource
win10v2004-20240802-en
General
-
Target
e80c6ee97a94509de809f69a1134704d.zip
-
Size
2.5MB
-
MD5
5165d7a7f827b6cee0509f1efb961cd7
-
SHA1
dd39ebd12970b326c4af2933f534fcffb3ba9070
-
SHA256
88bd6316b20fcf92bc180412aae9446bb69c458ece3de46b66447b71a2ef21ed
-
SHA512
3c77d3ef3a02c308ff89972d261bab73ebc3343b2bd2b02bd91e04ba3beb5a23544a59ed42f1dbc561bc130006810a1eaed6d801fe6b7a0277108ddf8caa16e1
-
SSDEEP
49152:Nfuz3x7BxIsx3TDpiyjdv47r6NcH84B1l4iaCl7r8qeSgV2hs635vTu2:o1fhx3g6dkr6ecsX1HiSgV2663tTx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/de35c0635e0f208d936f95bc0302c4c24b1551e9c6ebaeb6064f0ea47d1a0e93
Files
-
e80c6ee97a94509de809f69a1134704d.zip.zip
Password: infected
-
de35c0635e0f208d936f95bc0302c4c24b1551e9c6ebaeb6064f0ea47d1a0e93.dll windows:6 windows x86 arch:x86
Password: infected
2f820fb95cbee51c5ae3e38684577626
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
isspace
_amsg_exit
_initterm
_XcptFilter
_CxxThrowException
memset
memcpy
_strdup
isxdigit
atof
modf
isalnum
_isnan
ceil
_finite
_clearfp
_controlfp
strrchr
strncmp
_fpclass
_strnicmp
_purecall
setlocale
_stricmp
toupper
isdigit
isalpha
tolower
atoi
qsort
memmove
malloc
free
??2@YAPAXI@Z
??3@YAXPAX@Z
strchr
_vsnprintf
__CxxFrameHandler
strstr
floor
_CIfmod
_CItanh
_CItan
_CIsinh
_CIsin
_CIlog
_CIpow
_CIexp
_CIsqrt
_CIcosh
_CIcos
_CIatan2
_CIatan
_CIasin
_CIacos
gdi32
DeleteObject
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlUnwind
UnmapViewOfFile
CloseHandle
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
UnhandledExceptionFilter
VirtualFree
GetFullPathNameA
OutputDebugStringA
GetModuleHandleA
LoadLibraryA
lstrcmpiA
TlsFree
TlsAlloc
InterlockedExchange
Sleep
TlsSetValue
InterlockedCompareExchange
TlsGetValue
GetVersion
GetSystemInfo
GetProcAddress
VirtualAlloc
DisableThreadLibraryCalls
SetUnhandledExceptionFilter
Exports
Exports
D3DCompileFromMemory
D3DDisassembleCode
D3DDisassembleEffect
D3DGetCodeDebugInfo
D3DGetInputAndOutputSignatureBlob
D3DGetInputSignatureBlob
D3DGetOutputSignatureBlob
D3DPreprocessFromMemory
D3DReflectCode
DebugSetMute
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ