D:\work\zprogg\Release\zprog.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9664203a9102e91299f6d61c1f06d02b422fa884aa59d0f6347fb2851641b621.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9664203a9102e91299f6d61c1f06d02b422fa884aa59d0f6347fb2851641b621.dll
Resource
win10v2004-20240802-en
General
-
Target
9664203a9102e91299f6d61c1f06d02b422fa884aa59d0f6347fb2851641b621
-
Size
3.3MB
-
MD5
66f4dd86bad3a7f6ff98850e2d261cec
-
SHA1
d45c3458bf9b69f8b89fc8c84666c49a48103c2e
-
SHA256
9664203a9102e91299f6d61c1f06d02b422fa884aa59d0f6347fb2851641b621
-
SHA512
3e60ee13b68ea8951ef3cf76207527838edec65ffe230943f4db9cd3dbab498eb938291cb3b2a0288a94f5f6f2e5e9654b549eab8ded58c5235e3394c0aa50ae
-
SSDEEP
98304:sKwKFd1dlcfQ8JJUomw7GQu8R9lhpN7X3eHv1:p1aJUeBtH7X6N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9664203a9102e91299f6d61c1f06d02b422fa884aa59d0f6347fb2851641b621
Files
-
9664203a9102e91299f6d61c1f06d02b422fa884aa59d0f6347fb2851641b621.dll windows:5 windows x86 arch:x86
55a536f6bd95eec81865cd52a8091052
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
Process32Next
CloseHandle
WritePrivateProfileStringA
GetProcAddress
LocalFree
RemoveDirectoryA
DeleteCriticalSection
CreateProcessW
WideCharToMultiByte
CreateDirectoryA
DeleteFileA
VirtualQuery
Sleep
SizeofResource
WriteFile
FindResourceA
GetEnvironmentVariableA
CopyFileA
CreateFileA
LockResource
GetSystemInfo
LoadResource
MoveFileExA
OutputDebugStringW
GetFileAttributesA
GetLastError
MultiByteToWideChar
CreateToolhelp32Snapshot
GetCommandLineA
OpenProcess
GetModuleHandleA
GetFileAttributesW
WaitForSingleObject
CreateMutexA
FindClose
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
FindNextFileA
TerminateProcess
GetCurrentProcess
GetCommandLineW
EnterCriticalSection
FindFirstFileA
Process32First
GetModuleFileNameA
HeapSize
WriteConsoleW
ReadConsoleW
SetEnvironmentVariableA
SetEndOfFile
FreeEnvironmentStringsW
EncodePointer
DecodePointer
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
InterlockedFlushSList
CreateFileW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
ReadFile
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetStdHandle
GetACP
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
DeleteFileW
GetProcessHeap
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
advapi32
CloseServiceHandle
OpenSCManagerW
BuildExplicitAccessWithNameA
SetEntriesInAclA
RegCloseKey
SetNamedSecurityInfoA
RegDeleteKeyW
GetNamedSecurityInfoA
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
CreateServiceW
shell32
CommandLineToArgvW
shlwapi
PathRemoveFileSpecA
PathFileExistsA
Exports
Exports
fnzprog
fnzproglocal
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ