D:\My Documents\Visual Studio 2019\Projects\AccEnabler\Release\AccEnabler.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b3ae29ab79733c4728a52ba8e84e2aaacef7b6c5e07f60589f2904bd813495d3.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3ae29ab79733c4728a52ba8e84e2aaacef7b6c5e07f60589f2904bd813495d3.dll
Resource
win10v2004-20240802-en
General
-
Target
b3ae29ab79733c4728a52ba8e84e2aaacef7b6c5e07f60589f2904bd813495d3
-
Size
10.4MB
-
MD5
50cc7db68aba8b2e60318e21a3f5bd4b
-
SHA1
da7e9f8a40a1b0369beef3048ee80fae6bd9da99
-
SHA256
b3ae29ab79733c4728a52ba8e84e2aaacef7b6c5e07f60589f2904bd813495d3
-
SHA512
99647bd8383f28c2091f79158e0848d5c86e4d9d77072d27d36682e16968525f4be8d8603bb6b94eb76bd990fc9e54cbc5731973a38bf91048255ecd8af485df
-
SSDEEP
196608:hBuYqxH3NmooIeztKT2uEdAQP3LT/cnHuBOT6zIH7fU0ykFj4Tjy:FqxH9mFICQ2NdAs33cnHusT6zcU07Fj2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3ae29ab79733c4728a52ba8e84e2aaacef7b6c5e07f60589f2904bd813495d3
Files
-
b3ae29ab79733c4728a52ba8e84e2aaacef7b6c5e07f60589f2904bd813495d3.dll windows:6 windows x86 arch:x86
8337ed2546320a156c412a2374df187e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualAllocEx
ReadProcessMemory
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
FreeLibrary
CreateFileMappingW
OpenThread
VirtualQueryEx
GetExitCodeProcess
CreateThread
GetVersionExW
LoadLibraryA
GetProcessId
IsWow64Process
CreateRemoteThread
lstrlenW
VirtualFreeEx
TlsSetValue
EnterCriticalSection
lstrcpynW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
CreateFileW
GetFileAttributesW
CreateToolhelp32Snapshot
GetExitCodeThread
ProcessIdToSessionId
FormatMessageW
GetFileAttributesExW
Process32NextW
TlsAlloc
Process32FirstW
Module32FirstW
DeleteCriticalSection
VerSetConditionMask
VerifyVersionInfoW
TlsGetValue
Module32NextW
MapViewOfFile
lstrcmpiW
GetProcessTimes
CreateEventW
GetWindowsDirectoryW
SetEvent
GetSystemTimeAsFileTime
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
OpenEventW
IsProcessorFeaturePresent
GetLocaleInfoW
VirtualProtectEx
CloseHandle
OutputDebugStringW
GetLastError
Sleep
MultiByteToWideChar
OpenProcess
UnmapViewOfFile
GetCurrentThreadId
WaitForSingleObject
TerminateProcess
SetLastError
VirtualProtect
WriteProcessMemory
FindResourceExW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
LoadLibraryW
GetCurrentProcess
GetProcAddress
DisableThreadLibraryCalls
SizeofResource
LockResource
LoadResource
FindResourceW
IsDebuggerPresent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
InitializeSListHead
user32
GetProcessWindowStation
GetUserObjectInformationW
GetClassNameW
MessageBoxA
GetActiveWindow
SendMessageTimeoutW
MessageBoxW
IsWindowVisible
FindWindowExW
GetLastActivePopup
GetWindowThreadProcessId
GetClassLongW
ole32
CoInitialize
CoUninitialize
oleaut32
VariantClear
GetErrorInfo
SysFreeString
VariantInit
ntdll
RtlNtStatusToDosError
NtQuerySystemInformation
NtSuspendProcess
NtResumeProcess
NtQueryInformationProcess
NtSetEvent
NtCreateKeyedEvent
NtWaitForKeyedEvent
NtReleaseKeyedEvent
RtlInterlockedPopEntrySList
RtlFindClearBitsAndSet
RtlLeaveCriticalSection
RtlMultiByteToUnicodeSize
RtlMultiByteToUnicodeN
RtlEnterCriticalSection
RtlUTF8ToUnicodeN
RtlReAllocateHeap
RtlAllocateHeap
NtQueryValueKey
RtlGetVersion
RtlSetHeapInformation
RtlCreateHeap
RtlInterlockedPushEntrySList
RtlRaiseStatus
NtOpenProcessToken
NtWaitForSingleObject
RtlFreeHeap
NtCreateEvent
NtClose
NtReadVirtualMemory
NtQueryInformationToken
NtOpenProcess
NtQuerySystemInformationEx
NtQuerySymbolicLinkObject
RtlConvertSidToUnicodeString
RtlUpcaseUnicodeChar
NtOpenKey
NtQueryVirtualMemory
NtOpenSymbolicLinkObject
shlwapi
PathMatchSpecW
PathIsRelativeW
PathFindFileNameW
wtsapi32
WTSQuerySessionInformationW
WTSSendMessageW
WTSEnumerateSessionsW
WTSFreeMemory
oleacc
AccessibleObjectFromWindow
msvcr14x
fclose
_strupr
wcsnlen
malloc
strchr
strncpy
strncat
_strnicmp
wcschr
_wgetenv
_wfopen
wcsstr
_stricmp
_wcsnicmp
wcsncpy
wcsrchr
wcsncmp
_beginthreadex
_strupr_l
_wcreate_locale
memmove
memset
memcpy
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_cexit
_except_handler4_common
_callnewh
terminate
__current_exception
__current_exception_context
_initterm
_initterm_e
__std_exception_copy
__std_exception_destroy
_CxxThrowException
__std_type_info_destroy_list
_wcsicmp
_recalloc
calloc
free
_errno
_invalid_parameter_noinfo
wmemcpy_s
__stdio_common_vswprintf_s
__stdio_common_vswprintf
__std_terminate
__CxxFrameHandler3
fread
Exports
Exports
CheckForEnableAccessibility
IsMatch
JiuJiuHaizi
Sections
.text Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pcode0 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6.9MB - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ