c:\Gold\Hot\work\throw\hot\Log\Oftenrepresent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd.dll
Resource
win7-20240708-en
General
-
Target
acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd
-
Size
764KB
-
MD5
ebc6187124521528375d17372a16ae94
-
SHA1
1aee7da350e939d1686cd52c258f05270e63f990
-
SHA256
acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd
-
SHA512
6e8f3dbc3a3121c00b6574558be8acc3331e7a8b7ca6aa2ae354d9d6ae62a69ffc3541f40b16cd0fb5364dd9f4ec430639a1ffaec987fa2d4dfd0850930f56f5
-
SSDEEP
12288:hnRMkNXTsN/ReZfzXizT4w59FYayoqtlZ/e:hRMklbfzXizT4aF9Atl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd
Files
-
acc5fe0088037ddc055f9286380c56583effa1186afe9d08caea3e197b2643fd.dll windows:4 windows x86 arch:x86
419070fe079091b3689016bb9d778c66
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTempPathA
CompareStringW
CompareStringA
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
ReadFile
GetLocaleInfoW
LoadLibraryA
GetCurrentDirectoryA
IsValidCodePage
IsValidLocale
VirtualProtect
OpenMutexA
ResetEvent
CopyFileA
VirtualAlloc
CreateDirectoryA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetOEMCP
GetACP
HeapSize
CloseHandle
SetFilePointer
FlushFileBuffers
GetSystemDirectoryA
Sleep
GetProcessHeap
VirtualFree
HeapAlloc
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
GetCPInfo
GetLastError
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetTimeZoneInformation
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
user32
DrawFrameControl
LoadImageA
DispatchMessageA
PostMessageA
AppendMenuA
GetActiveWindow
CheckMenuRadioItem
IsDialogMessageA
DrawIcon
IsWindowEnabled
GetClassNameA
TrackPopupMenu
FillRect
gdi32
SetPixel
StretchBlt
GetTextExtentPoint32A
PatBlt
SelectObject
ole32
OleUninitialize
OleInitialize
ws2_32
WSAStartup
WSAWaitForMultipleEvents
WSASocketA
WSAConnect
WSACleanup
xolehlp
ord7
imm32
ImmGetContext
ImmGetCompositionStringA
ImmSetCompositionWindow
ImmSetCompositionFontA
ImmNotifyIME
Sections
.text Size: 304KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 436KB - Virtual size: 432KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ