D:\a\ExplorerPatcher\ExplorerPatcher\build\Release\ExplorerPatcher.IA-32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e976e49233ff4beb1bce39f7bb5fa5845cf84242a309c147b652c3c9cd081074.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e976e49233ff4beb1bce39f7bb5fa5845cf84242a309c147b652c3c9cd081074.dll
Resource
win10v2004-20240802-en
General
-
Target
e976e49233ff4beb1bce39f7bb5fa5845cf84242a309c147b652c3c9cd081074
-
Size
195KB
-
MD5
6cf0e0cd784b20c8120cc5a9665537b3
-
SHA1
af5a9c09b06001862f80e3094638d866a07df7a1
-
SHA256
e976e49233ff4beb1bce39f7bb5fa5845cf84242a309c147b652c3c9cd081074
-
SHA512
d24ab3daec58992c30082335a7d249fbeb364d13cdc3a4c22af4c11d15dd0a61fa14b65b8c460c38d0e70a59f41706aa4efe7fef8b1bf6aea57285e6ab51856b
-
SSDEEP
3072:4MLa7hYtotE80TRx9vdVVtCd2IkLde5Q6ptzIYCNtIx0iJRi3lFeMC3z:47BqRx9vd3thdLYjjI9tIWi3imz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e976e49233ff4beb1bce39f7bb5fa5845cf84242a309c147b652c3c9cd081074
Files
-
e976e49233ff4beb1bce39f7bb5fa5845cf84242a309c147b652c3c9cd081074.dll windows:6 windows x86 arch:x86
3b88e403e62ca7137c85a4a9f5ab3c14
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
FreeLibrary
QueryFullProcessImageNameW
AllocConsole
VirtualQuery
LoadLibraryExW
WaitForMultipleObjects
WaitForSingleObject
WriteConsoleW
HeapSize
GetStringTypeW
FlushFileBuffers
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetWindowsDirectoryW
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
ReadFile
SetEndOfFile
SetStdHandle
MultiByteToWideChar
GetConsoleMode
GetConsoleOutputCP
WriteFile
GetStdHandle
LCMapStringW
CreateThread
LoadLibraryW
FreeConsole
CloseHandle
DisableThreadLibraryCalls
SetEvent
GetLastError
CreateEventW
OpenProcess
GetSystemDirectoryW
CompareStringOrdinal
GetModuleFileNameW
GetModuleHandleExW
HeapFree
HeapAlloc
ExitProcess
GetFileType
DecodePointer
CreateFileW
RaiseException
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
SetLastError
VirtualProtect
HeapReAlloc
CreateDirectoryW
EnterCriticalSection
RtlUnwind
InterlockedFlushSList
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
user32
GetParent
SystemParametersInfoW
InvalidateRect
GetAncestor
GetWindowTextW
RegisterWindowMessageW
SendMessageW
RedrawWindow
GetWindowLongW
GetMenuItemInfoW
GetClassWord
PostMessageW
FindWindowExW
GetWindowRect
GetPropW
GetMenuItemCount
CreateWindowExW
RemovePropW
TrackPopupMenu
SetMenuItemInfoW
EnumPropsA
MapWindowPoints
SendNotifyMessageW
SetPropW
FindWindowW
GetClassNameW
SetWindowLongW
GetSystemMetricsForDpi
advapi32
RegDeleteKeyValueW
RegGetValueW
RegOpenKeyExW
CheckTokenMembership
RegNotifyChangeKeyValue
RegCloseKey
AllocateAndInitializeSid
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
FreeSid
shell32
SHGetFolderPathW
shlwapi
PathStripPathW
PathFileExistsW
uxtheme
SetWindowThemeAttribute
comctl32
ord410
ord412
ord413
dwmapi
DwmExtendFrameIntoClientArea
DwmSetWindowAttribute
dbghelp
ImageDirectoryEntryToDataEx
Exports
Exports
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 93KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ