d:\jk_9\workspace\GSP_ERR240506025-TASK1_release_20240516_xujinren_A3F231215001_m20240223_windows\code_path\NPAPI__49ba2b\Bin\Win32\Win_x86_32\pdb\npMedia.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dae2c9fd6776be21bfc81b4227dfc0e0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dae2c9fd6776be21bfc81b4227dfc0e0N.dll
Resource
win10v2004-20240802-en
General
-
Target
dae2c9fd6776be21bfc81b4227dfc0e0N.exe
-
Size
356KB
-
MD5
dae2c9fd6776be21bfc81b4227dfc0e0
-
SHA1
22dbf2631d610127bdd2f56b2240c059ab5942a4
-
SHA256
40955b90449a615b73fc9048bc231b992a864d79469266e4bf3180bddc535c42
-
SHA512
a765b5f6dc0b09135a55e8582e666869ee8f734145655241781dc0b22448b70183bbe1a2d8e83bfd6a5acf06520ca205e511c19920355bfdff7809e22d857dfa
-
SSDEEP
6144:Vd3wltfzrvcSoJ+gCu5Kyx0uzx4vyfSZOSI58yo2h+EC:Vd3Gpz7cSoggCLy7fEYYE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dae2c9fd6776be21bfc81b4227dfc0e0N.exe
Files
-
dae2c9fd6776be21bfc81b4227dfc0e0N.exe.dll windows:4 windows x86 arch:x86
2b932411a09731560e3208a6e9f06ff5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
shlwapi
PathFindFileNameA
PathFindExtensionA
PathAppendA
PathRemoveFileSpecA
PathAddBackslashA
winmm
PlaySoundW
kernel32
GetCPInfo
GetOEMCP
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
CreateFileA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualAlloc
HeapReAlloc
ExitProcess
GetCommandLineA
DeleteFileW
GetFileAttributesW
CreateDirectoryW
RtlUnwind
RaiseException
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
Sleep
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetThreadLocale
GlobalFlags
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetVersionExA
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleFileNameW
GetModuleHandleA
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
WaitForSingleObject
ReleaseMutex
CreateMutexA
InterlockedDecrement
InterlockedIncrement
SetLastError
GlobalFree
CloseHandle
CreateFileW
GetProcessHeap
HeapFree
HeapAlloc
Thread32First
OutputDebugStringA
GetCurrentThreadId
GetCurrentProcessId
Thread32Next
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
lstrlenA
MultiByteToWideChar
GetVersion
GetLastError
WideCharToMultiByte
CompareStringA
InterlockedExchange
LoadLibraryExA
FindNextFileA
GetModuleFileNameA
GetProcAddress
FreeLibrary
FindFirstFileA
VirtualQuery
SetFileAttributesW
user32
PostQuitMessage
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetWindowTextA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
CopyRect
PostMessageA
AdjustWindowRectEx
GetWindowLongA
GetClientRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
SetWindowLongA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
UnhookWindowsHookEx
ValidateRect
PeekMessageA
GetKeyState
SendMessageA
DispatchMessageA
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
gdi32
GetStockObject
DeleteDC
GetClipBox
CreateBitmap
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetSaveFileNameW
GetOpenFileNameW
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
oleaut32
VariantClear
VariantChangeType
VariantInit
oleacc
LresultFromObject
CreateStdAccessibleObject
Exports
Exports
NP_GetEntryPoints
NP_Initialize
NP_Shutdown
Sections
.text Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ