C:\Users\MONSTER\Desktop\DreamSoft v2.383\DreamSoft v2.383\Release\DreamSoft.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bcc0b0d65c3cdea99dd99a3687cd3b788dec2694b6ac732ad1dd0031ed2ec333N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bcc0b0d65c3cdea99dd99a3687cd3b788dec2694b6ac732ad1dd0031ed2ec333N.dll
Resource
win10v2004-20240802-en
General
-
Target
bcc0b0d65c3cdea99dd99a3687cd3b788dec2694b6ac732ad1dd0031ed2ec333N.exe
-
Size
120KB
-
MD5
fcc2edb5cf48576de3c2801bbe6aba80
-
SHA1
c20dd8e445307674173124ce48620fe8af0e9f57
-
SHA256
bcc0b0d65c3cdea99dd99a3687cd3b788dec2694b6ac732ad1dd0031ed2ec333
-
SHA512
a1bd3eabd587270d4e1ee86838aa3810e58926a671ebf74ee5898087b718c7b9675b9c7af51de9a0c96d247e49d5a3c3e975d6219dbb1351bfa8aa65ca66781e
-
SSDEEP
3072:8HmTrnfiFh5qcZvFdAeaXC74avpQpA5binh:Zr8h5lRFYubinh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcc0b0d65c3cdea99dd99a3687cd3b788dec2694b6ac732ad1dd0031ed2ec333N.exe
Files
-
bcc0b0d65c3cdea99dd99a3687cd3b788dec2694b6ac732ad1dd0031ed2ec333N.exe.dll windows:6 windows x86 arch:x86
183d60d0676ad1e2f292f41c1b558ab5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentProcessId
GetCurrentThreadId
TerminateProcess
ExitProcess
CloseHandle
IsDebuggerPresent
WideCharToMultiByte
CreateEventA
SetEvent
WaitForSingleObjectEx
WriteFile
QueryPerformanceCounter
GetSystemTimeAsFileTime
CreateFileW
HeapFree
InitializeCriticalSectionEx
HeapSize
GetLastError
HeapReAlloc
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
LoadLibraryExW
FreeLibrary
OpenEventA
ResetEvent
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcess
GetProcAddress
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
EncodePointer
MultiByteToWideChar
GetCPInfo
GetStringTypeW
SetLastError
GetModuleHandleW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetModuleFileNameW
LCMapStringW
GetStdHandle
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ