F:\VCtest\Projects\NEWGZXTEST\GZX\Release\ReplayClientTest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4c0f594fed09acec7b7c85bfeca264a353411a1d855f13c359c0519a13b80b4d.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c0f594fed09acec7b7c85bfeca264a353411a1d855f13c359c0519a13b80b4d.dll
Resource
win10v2004-20240802-en
General
-
Target
4c0f594fed09acec7b7c85bfeca264a353411a1d855f13c359c0519a13b80b4d
-
Size
575KB
-
MD5
9176aa00f43be0929d9947437cafe9a1
-
SHA1
3288370c70659f7f427737242a1a53fdd65de896
-
SHA256
4c0f594fed09acec7b7c85bfeca264a353411a1d855f13c359c0519a13b80b4d
-
SHA512
d083a760e7660ca041890f7b67bced1fedbc5c0e55963bfcdf8d0ea4dd3dffc253a9eb13d430ca0a853781f404705c75980e4dc42777bcdb25afd42b3fa48143
-
SSDEEP
12288:E7Fpi3mdO6Ns2GchDzsXvaXoBVAGgCZcW5bb8+Sv80Dl9dg0GSzHkN/f2+4fQk/N:q7i3mdNxGchDzsXvaKVAGgMcW5X8+Bav
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c0f594fed09acec7b7c85bfeca264a353411a1d855f13c359c0519a13b80b4d
Files
-
4c0f594fed09acec7b7c85bfeca264a353411a1d855f13c359c0519a13b80b4d.dll windows:5 windows x86 arch:x86
68c204afddfa188e90e5c0d17364a42b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfc140u
ord4988
ord4502
ord9693
ord4494
ord3055
ord14590
ord7923
ord14596
ord6877
ord11717
ord13703
ord5935
ord2682
ord12124
ord3941
ord3372
ord4974
ord3265
ord12168
ord5249
ord5549
ord5760
ord9350
ord5525
ord5790
ord5252
ord5411
ord5228
ord7722
ord7723
ord7712
ord5409
ord8219
ord10255
ord9210
ord7495
ord1113
ord6489
ord6566
ord3882
ord2304
ord1111
ord462
ord7109
ord290
ord296
ord5110
ord5019
ord4927
ord4997
ord5013
ord4954
ord4960
ord4966
ord4948
ord5003
ord4936
ord1777
ord1770
ord1744
ord1722
ord12258
ord12262
ord13878
ord3266
ord9235
ord11002
ord6978
ord12173
ord8965
ord14588
ord11936
ord3838
ord12089
ord9139
ord11726
ord11725
ord5652
ord10288
ord10284
ord10286
ord10287
ord10285
ord14785
ord2760
ord8210
ord3302
ord3305
ord13752
ord6218
ord3164
ord3403
ord3404
ord4092
ord10472
ord11396
ord11015
ord9040
ord12131
ord4942
ord4912
ord3371
ord1756
ord2246
ord360
ord13253
ord1067
ord2385
ord2389
ord485
ord2374
ord4815
ord2268
ord280
ord1045
ord265
ord266
ord1511
ord1513
kernel32
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
GetModuleHandleW
GetModuleFileNameW
SetLastError
IsBadReadPtr
InitializeCriticalSection
OpenThread
GetPrivateProfileStringA
GetPrivateProfileIntA
GetCurrentProcessId
DeleteCriticalSection
GetFileSize
GetProcAddress
GetLocalTime
HeapAlloc
CreateThread
LoadLibraryW
WritePrivateProfileStringA
CloseHandle
LoadLibraryA
CreateFileA
GetLastError
Sleep
CreateToolhelp32Snapshot
VirtualProtect
CreateEventA
InitializeCriticalSectionEx
FormatMessageW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
MoveFileExA
WaitForMultipleObjects
VirtualFreeEx
CreateFileW
OutputDebugStringW
VirtualAllocEx
OpenProcess
IsWow64Process
SetThreadContext
GetThreadContext
ResumeThread
SuspendThread
GetExitCodeThread
HeapCreate
Thread32Next
GetModuleHandleA
GetFileSizeEx
VerifyVersionInfoW
VerSetConditionMask
PeekNamedPipe
GetFileType
GetStdHandle
GetEnvironmentVariableA
SleepEx
FreeLibrary
GetSystemDirectoryA
GetCurrentThread
QueryPerformanceFrequency
MultiByteToWideChar
GetTickCount
WideCharToMultiByte
CreateDirectoryW
ReadFile
GetModuleFileNameA
WritePrivateProfileStringW
EnterCriticalSection
GetPrivateProfileIntW
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
LeaveCriticalSection
Thread32First
WaitForSingleObject
user32
PostMessageA
SetTimer
GetWindowThreadProcessId
SetWindowLongA
FindWindowExA
CallWindowProcA
GetWindowTextA
MessageBoxA
KillTimer
EnableWindow
advapi32
OpenThreadToken
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
CryptAcquireContextA
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
shlwapi
StrStrW
msvcp140
??0_Lockit@std@@QAE@H@Z
??1_Lockit@std@@QAE@XZ
_Strcoll
_Strxfrm
?_Init@locale@std@@CAPAV_Locimp@12@_N@Z
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z
?id@?$ctype@D@std@@2V0locale@2@A
?id@?$collate@D@std@@2V0locale@2@A
?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?tolower@?$ctype@D@std@@QBEPBDPADPBD@Z
?tolower@?$ctype@D@std@@QBEDD@Z
??1facet@locale@std@@MAE@XZ
??0facet@locale@std@@IAE@I@Z
?_Decref@facet@locale@std@@UAEPAV_Facet_base@3@XZ
?_Incref@facet@locale@std@@UAEXXZ
??Bid@locale@std@@QAEIXZ
?_Getcoll@_Locinfo@std@@QBE?AU_Collvec@@XZ
??1_Locinfo@std@@QAE@XZ
??0_Locinfo@std@@QAE@PBD@Z
?_Xbad_function_call@std@@YAXXZ
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
ws2_32
ioctlsocket
connect
getpeername
getsockname
WSAStartup
gethostname
WSAIoctl
setsockopt
sendto
recvfrom
listen
bind
freeaddrinfo
getaddrinfo
accept
__WSAFDIsSet
socket
WSACleanup
WSASetLastError
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
getsockopt
ntohl
closesocket
select
WSAGetLastError
htons
htonl
recv
inet_ntoa
ntohs
inet_addr
send
vcruntime140
strrchr
__std_terminate
memmove
memcpy
strstr
memset
__CxxFrameHandler3
__vcrt_InitializeCriticalSectionEx
__telemetry_main_invoke_trigger
__telemetry_main_return_trigger
_except_handler4_common
__std_type_info_destroy_list
_CxxThrowException
__std_exception_copy
__std_exception_destroy
strchr
memchr
_purecall
api-ms-win-crt-utility-l1-1-0
rand
qsort
api-ms-win-crt-runtime-l1-1-0
_errno
terminate
__sys_errlist
_initterm_e
_initterm
_beginthreadex
_seh_filter_dll
_initialize_narrow_environment
__sys_nerr
_cexit
_crt_atexit
_initialize_onexit_table
exit
_execute_onexit_table
_register_onexit_function
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-string-l1-1-0
strcspn
strncmp
_wcsicmp
strpbrk
strspn
_strdup
strtok
strncpy
api-ms-win-crt-stdio-l1-1-0
_read
_write
_fileno
_close
__stdio_common_vsprintf
_lseeki64
fseek
fgets
fopen
__acrt_iob_func
_open
fflush
fputc
__stdio_common_vsscanf
__stdio_common_vfprintf_s
fwrite
fclose
ftell
feof
__stdio_common_vswprintf
__stdio_common_vfprintf
fputs
fread
__stdio_common_vsprintf_s
_fseeki64
api-ms-win-crt-time-l1-1-0
_time64
_localtime64_s
_gmtime64
strftime
api-ms-win-crt-heap-l1-1-0
malloc
realloc
free
calloc
api-ms-win-crt-convert-l1-1-0
strtoll
strtoul
strtol
atoi
wcstombs
bcrypt
BCryptGenRandom
crypt32
CertOpenStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertCloseStore
api-ms-win-crt-filesystem-l1-1-0
_stat64
_fstat64
_unlink
api-ms-win-crt-math-l1-1-0
_except1
_fdopen
normaliz
IdnToAscii
IdnToUnicode
wldap32
ord217
ord46
ord211
ord60
ord45
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord143
Sections
.text Size: 458KB - Virtual size: 458KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ