F:\_svnnew\skcode\pro\src\pro\_release32\pro_net.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c4ceb0e70816741891715a8882bbaee93188a767f360d5f4218b91265102bd7.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3c4ceb0e70816741891715a8882bbaee93188a767f360d5f4218b91265102bd7.dll
Resource
win10v2004-20240802-en
General
-
Target
3c4ceb0e70816741891715a8882bbaee93188a767f360d5f4218b91265102bd7
-
Size
128KB
-
MD5
6542663d17a37257f164c1ce782510e6
-
SHA1
f994305bfa537ae515131599608884b7874f57ff
-
SHA256
3c4ceb0e70816741891715a8882bbaee93188a767f360d5f4218b91265102bd7
-
SHA512
9092a053c152137e6b8f4ab940540531042d835f86f829276afee6255868d1a1605cf2c81aa5576301998a340c11ef7a7f727338e86b6244c2ba6f67a6473314
-
SSDEEP
3072:/S3oCTaAVBui6VYv+gTcP9IdDH/i1R9PTmmB:K3NaA2TVYv+889Id7Krm0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c4ceb0e70816741891715a8882bbaee93188a767f360d5f4218b91265102bd7
Files
-
3c4ceb0e70816741891715a8882bbaee93188a767f360d5f4218b91265102bd7.dll windows:5 windows x86 arch:x86
1286f6e81494721627729cffd5f62ea6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThread
SetThreadPriority
GetCurrentThreadId
FlushFileBuffers
CreateFileW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
RtlUnwind
LoadLibraryW
HeapAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
CreateSemaphoreA
ReleaseSemaphore
EnterCriticalSection
DeleteCriticalSection
CloseHandle
InterlockedIncrement
InterlockedDecrement
Sleep
ResumeThread
DecodePointer
EncodePointer
GetCommandLineA
ExitThread
GetLastError
CreateThread
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapFree
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetProcAddress
ExitProcess
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
pro_shared
ProDeallocateSgiPoolBuffer
ProAllocateSgiPoolBuffer
ProGetTickCount64Win
ProSrand
ws2_32
getpeername
WSAIoctl
connect
WSAStartup
recvfrom
select
WSAGetLastError
getsockname
setsockopt
sendto
recv
bind
socket
closesocket
gethostbyname
send
listen
accept
winmm
timeGetDevCaps
timeBeginPeriod
timeEndPeriod
Exports
Exports
ProCloseSockId
ProCreateAcceptor
ProCreateConnector
ProCreateMcastTransport
ProCreateReactor
ProCreateTcpHandshaker
ProCreateTcpTransport
ProCreateUdpTransport
ProDeleteAcceptor
ProDeleteConnector
ProDeleteReactor
ProDeleteTcpHandshaker
ProDeleteTransport
ProGetAcceptorPort
ProNetInit
ProOpenTcpSockId
ProOpenUdpSockId
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ