msADOX.pdb
Static task
static1
Behavioral task
behavioral1
Sample
msadox.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
msadox.dll
Resource
win10v2004-20240802-en
General
-
Target
acac368e71e388881bcddec4ea121a1344b740ec3fe3f136126c171b3b80da6cN
-
Size
69KB
-
MD5
8926f47379e73cb1e1a304b36a347570
-
SHA1
999eb2a4e3ad13d3a7c9dc1c05078732189f6914
-
SHA256
acac368e71e388881bcddec4ea121a1344b740ec3fe3f136126c171b3b80da6c
-
SHA512
ec4d398dd1897b85f1d3cff7c92a5ec52f90fbad47f1a9ed1afa3764cc8e7c648dbcd79d1deb030f9c0af99afd84785bf0de323044569fb3ad503e3a57f936ff
-
SSDEEP
1536:USk8ZN+fcs9pdCAGTk23Tl1/rIuTrQUuEY8+R+:UogfhdCAA/zBk2Yf+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/msadox.dll
Files
-
acac368e71e388881bcddec4ea121a1344b740ec3fe3f136126c171b3b80da6cN.cab
-
msadox.dll.dll regsvr32 windows:5 windows x86 arch:x86
9b81f95f1461ed7024a8d9a639029aad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
__CxxFrameHandler
_except_handler3
wcscat
wcscpy
wcstod
wcschr
_wcsicmp
wcslen
_wcsnicmp
memmove
swprintf
_CxxThrowException
_purecall
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_adjust_fdiv
_initterm
free
malloc
sprintf
msdart
UMSEnterCSWraper
_LoadVersionedResourceEx@16
??0CReaderWriterLock3@@QAE@XZ
?WriteLock@CReaderWriterLock3@@QAEXXZ
?WriteUnlock@CReaderWriterLock3@@QAEXXZ
?ReadOrWriteLock@CReaderWriterLock3@@QAE_NXZ
?ReadOrWriteUnlock@CReaderWriterLock3@@QAEX_N@Z
FXMemAttach
MpGetHeapHandle
FXMemDetach
MPDeleteCriticalSection
MPInitializeCriticalSection
MpHeapAlloc
MpHeapFree
kernel32
Sleep
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetTickCount
InterlockedIncrement
InterlockedDecrement
DisableThreadLibraryCalls
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryA
IsBadCodePtr
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
InterlockedExchange
TlsSetValue
TlsGetValue
GetCurrentThreadId
lstrlenW
GetVersionExW
TlsAlloc
TlsFree
GetWindowsDirectoryW
GetUserDefaultLCID
GetCurrentProcessId
MultiByteToWideChar
WideCharToMultiByte
LeaveCriticalSection
lstrcpyW
CloseHandle
GetCurrentProcess
HeapDestroy
lstrcatW
InitializeCriticalSection
DeleteCriticalSection
CompareStringA
LCMapStringA
LCMapStringW
CompareStringW
EnterCriticalSection
QueryPerformanceCounter
TerminateProcess
user32
PostMessageW
LoadStringW
CharNextW
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegDeleteKeyW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
ole32
CoCreateInstance
CoTaskMemFree
CoCreateFreeThreadedMarshaler
oleaut32
SysFreeString
VariantInit
SetErrorInfo
VariantChangeType
VariantClear
LoadRegTypeLi
SysStringLen
SafeArrayPutElement
SafeArrayGetElement
VariantCopy
SysAllocString
LoadTypeLi
OaBuildVersion
SysAllocStringLen
CreateErrorInfo
SafeArrayDestroy
SafeArrayCreate
SafeArrayUnlock
SafeArrayCopy
RegisterTypeLi
GetErrorInfo
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 168KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdbid Size: 4KB - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ