dao360.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dao360.dll
Resource
win11-20240802-en
General
-
Target
dao360.dll
-
Size
596KB
-
MD5
2ffefb74864d962ef9f750787031a4e7
-
SHA1
ade2405a022628835fe16867c642a9113f630271
-
SHA256
4cc28a5be8dc7425a4c4c1ef275ca392f18be35d70232e777dce6d9f3b4d79ac
-
SHA512
2e5b739af7c4f3aeb90078a17c123d979633b811dcd3319aec8cd55d4d0744e1018cb50dbf9a2438df5d18f915b501721109215ce28ac0731f1c868a2fcac8d6
-
SSDEEP
6144:w61fl4ek3sazAFsWTjWIABMM05UZ9gq3qAVdVSRWrDuCYYQMPRmD7DHo/kT:w61s5AFsWBW0OZmq1PVSxCUca
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dao360.dll
Files
-
dao360.dll.dll regsvr32 windows:4 windows x86 arch:x86
9c5f847da94b5f0bf5cae18a9b2c4818
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcsstr
free
_vsnwprintf
_vsnprintf
toupper
memcmp
memmove
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
wcstod
malloc
memchr
_wtoi
atol
atoi
_wcsnicmp
wcscspn
wcschr
??1type_info@@UAE@XZ
__dllonexit
_onexit
?terminate@@YAXXZ
memcpy
memset
__CxxFrameHandler
kernel32
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
SetUnhandledExceptionFilter
RtlUnwind
DeleteCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalFree
GlobalHandle
GlobalReAlloc
GlobalAlloc
GlobalLock
GetSystemDefaultLCID
CompareStringA
IsDBCSLeadByte
TlsSetValue
lstrlenA
TlsGetValue
InterlockedDecrement
Sleep
InterlockedIncrement
FreeLibrary
GetProcAddress
LoadLibraryA
TlsFree
TlsAlloc
MultiByteToWideChar
GetModuleFileNameA
GetModuleHandleA
lstrlenW
WideCharToMultiByte
LeaveCriticalSection
GetCurrentThreadId
EnterCriticalSection
GetCurrentProcessId
LoadLibraryExA
CompareStringW
user32
PeekMessageW
GetWindowThreadProcessId
TranslateMessage
IsWindowVisible
GetWindowLongA
GetWindow
GetDesktopWindow
DispatchMessageW
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegSetValueExA
shell32
SHGetFolderPathA
ole32
CoGetClassObject
CoInitialize
CoUninitialize
CoGetMalloc
oleaut32
LoadRegTypeLi
CreateErrorInfo
SafeArrayPutElement
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
VariantCopy
VariantChangeType
SysReAllocString
VariantChangeTypeEx
SafeArrayRedim
SafeArrayDestroy
SafeArrayUnlock
SafeArrayLock
SafeArrayCreate
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocStringLen
DispGetParam
VariantClear
SysStringLen
GetErrorInfo
SetErrorInfo
VariantInit
SysAllocString
DispInvoke
DispGetIDsOfNames
LoadTypeLi
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllRegisterServerEx
DllUnregisterServer
Sections
.text Size: 428KB - Virtual size: 426KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 4KB - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ