D:\OnesoftXRBrowser\onesoft\dll\ModelShower.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f795fe1f58c9a98958728255f34bfb6a032512daa7684c8a98e787d10322c08d.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f795fe1f58c9a98958728255f34bfb6a032512daa7684c8a98e787d10322c08d.dll
Resource
win10v2004-20240802-en
General
-
Target
f795fe1f58c9a98958728255f34bfb6a032512daa7684c8a98e787d10322c08d
-
Size
290KB
-
MD5
40cc0a35dd3e42a2d10858c509d9f977
-
SHA1
6a434876853343deec5b044bf56c8b49ca155e02
-
SHA256
f795fe1f58c9a98958728255f34bfb6a032512daa7684c8a98e787d10322c08d
-
SHA512
f6971ddd11bf7eda477f98d47250539012b1e035bc42d9b7dc317d8f267a335933f69389b16257317b2ed78eb113ce3dc2ea2264d25397485564750d22c2ca33
-
SSDEEP
6144:R5rmAcEo1jV+YtDlX2s/1mI7gka2YEqkZQuOBxYSJ79Wd:frmA1sjV+wX2+mI7l5YEqkZSWd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f795fe1f58c9a98958728255f34bfb6a032512daa7684c8a98e787d10322c08d
Files
-
f795fe1f58c9a98958728255f34bfb6a032512daa7684c8a98e787d10322c08d.dll regsvr32 windows:5 windows x86 arch:x86
5e31a9f0533d9b155ec216dbfd2966f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GlobalFree
GetFileSize
GetPrivateProfileStringW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GlobalHandle
VirtualQuery
VirtualProtect
VirtualAlloc
VirtualFree
InterlockedCompareExchange
ResumeThread
SetThreadContext
GetThreadContext
SuspendThread
GetCurrentThread
Sleep
GetModuleHandleW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedPushEntrySList
IsProcessorFeaturePresent
InterlockedPopEntrySList
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedExchange
DecodePointer
EncodePointer
GlobalLock
GlobalUnlock
LoadLibraryW
SetLastError
lstrcmpW
GetCurrentThreadId
MulDiv
GlobalAlloc
GetCurrentProcess
FlushInstructionCache
GetThreadLocale
SetThreadLocale
LoadLibraryExW
FreeLibrary
lstrcmpiW
LeaveCriticalSection
EnterCriticalSection
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
lstrlenA
MultiByteToWideChar
GetModuleFileNameW
CreateFileW
CreateNamedPipeW
ConnectNamedPipe
GetLastError
GetSystemTimeAsFileTime
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
ReadFile
WriteFile
HeapDestroy
CloseHandle
user32
DestroyWindow
ReleaseCapture
GetDlgItem
EnableWindow
ShowWindow
SetWindowTextW
CreateWindowExW
SendMessageW
CharNextW
GetDialogBaseUnits
ReleaseDC
GetDC
GetParent
CheckMenuRadioItem
GetWindowRect
MoveWindow
IsWindow
LoadMenuW
DefWindowProcW
MapDialogRect
DrawTextW
GetSysColor
IsChild
SystemParametersInfoW
GetFocus
SetFocus
GetKeyState
ClientToScreen
SetWindowLongW
GetWindow
DestroyMenu
MonitorFromWindow
GetMonitorInfoW
ScreenToClient
GetClientRect
MapWindowPoints
SetWindowPos
MessageBoxW
SendDlgItemMessageW
PostMessageW
GetWindowLongW
EndDialog
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
GetClassNameW
FillRect
CallWindowProcW
EndPaint
BeginPaint
GetDesktopWindow
UnregisterClassA
GetActiveWindow
EnumChildWindows
CreateDialogIndirectParamW
DialogBoxIndirectParamW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
CopyAcceleratorTableW
IsDialogMessageW
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
GetNextDlgTabItem
UnionRect
PtInRect
CreateAcceleratorTableW
RegisterClassExW
LoadCursorW
GetClassInfoExW
SetWindowContextHelpId
DestroyAcceleratorTable
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegCloseKey
ole32
OleUninitialize
OleInitialize
ReadClassStm
OleSaveToStream
WriteClassStm
CreateOleAdviseHolder
CreateDataAdviseHolder
OleRegGetMiscStatus
OleRegGetUserType
OleRegEnumVerbs
CreateStreamOnHGlobal
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CLSIDFromString
shell32
ShellExecuteW
oleaut32
OleCreateFontIndirect
LoadRegTypeLi
DispCallFunc
OleCreatePropertyFrame
OleTranslateColor
SysFreeString
SafeArrayDestroy
VariantClear
SafeArrayPutElement
VariantInit
SafeArrayCreateVector
SafeArrayGetElement
VariantChangeType
SysStringLen
VarBstrCmp
SysAllocStringLen
SysAllocString
SysAllocStringByteLen
SysStringByteLen
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
VarBstrCat
shlwapi
PathFileExistsW
gdi32
SetBkMode
SetTextColor
Rectangle
GetStockObject
SetBkColor
GetObjectW
CreateDCW
RestoreDC
DeleteDC
SetViewportOrgEx
SetWindowOrgEx
GetDeviceCaps
SaveDC
LPtoDP
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
CreateSolidBrush
CreateRectRgnIndirect
DeleteMetaFile
CloseMetaFile
SetWindowExtEx
CreateMetaFileW
CreateFontIndirectW
SelectObject
GetTextMetricsW
SetMapMode
DeleteObject
GetTextExtentPointW
comctl32
DestroyPropertySheetPage
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Orphan_all@_Container_base0@std@@QAEXXZ
?_Xlength_error@std@@YAXPBD@Z
comdlg32
GetSaveFileNameW
GetOpenFileNameW
msvcr100
_wfopen
fwrite
wcstombs
fclose
_time64
_localtime64
sprintf
_resetstkoflw
wcstol
swprintf_s
_purecall
_wcslwr_s
wcspbrk
wcschr
_wcsicmp
iswspace
memcpy
_itow_s
_wtoi
memmove
_wcsnicmp
wcscat_s
wcsncpy_s
malloc
wcsstr
??0exception@std@@QAE@ABV01@@Z
??2@YAPAXI@Z
??1exception@std@@UAE@XZ
strftime
??0exception@std@@QAE@ABQBD@Z
_waccess
_beginthread
??_V@YAXPAX@Z
_recalloc
calloc
__clean_type_info_names_internal
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
free
vswprintf_s
_vscwprintf
wcscpy_s
memset
__CxxFrameHandler3
memmove_s
memcpy_s
wcsnlen
wcsrchr
wmemcpy_s
_CxxThrowException
??3@YAXPAX@Z
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_swprintf
setlocale
?what@exception@std@@UBEPBDXZ
?terminate@@YAXXZ
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourd Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ