msado15.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c06a6e2072bed9a0baf674496da00fd035f4da17dc67a0a2d25ebdf70dc90ca1N.dll
Resource
win10v2004-20241007-en
General
-
Target
c06a6e2072bed9a0baf674496da00fd035f4da17dc67a0a2d25ebdf70dc90ca1N
-
Size
1.1MB
-
MD5
54a114b17b955f66b408ee69bdffe6a0
-
SHA1
669158de5f46bf9c52563702d0a1141b8703c673
-
SHA256
c06a6e2072bed9a0baf674496da00fd035f4da17dc67a0a2d25ebdf70dc90ca1
-
SHA512
f29781bc9d453176ec79efc598a21a2367a1f0a8d39abc2998416913bf7aec147f577711135d1d891ae9b05485832c1e1b7af008574d0849ff26be4f49a7f219
-
SSDEEP
12288:LPAaQgXJ4H1nP50nlJAtRj7Ol7++koh/4EIF/7HpLBjQCjt2dTaoEYynkCS/P14c:cNgX+VPGEtRje07HoCjt2RQkz/xrEH7w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c06a6e2072bed9a0baf674496da00fd035f4da17dc67a0a2d25ebdf70dc90ca1N
Files
-
c06a6e2072bed9a0baf674496da00fd035f4da17dc67a0a2d25ebdf70dc90ca1N.dll regsvr32 windows:10 windows x86 arch:x86
ba5a0254734f114c3d6057c322daa776
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
strncpy_s
realloc
_stricmp
_ultoa_s
??1exception@@UAE@XZ
_wmakepath_s
??0exception@@QAE@XZ
_vsnwprintf
memcpy_s
_vsnprintf_s
memmove_s
??0exception@@QAE@ABV0@@Z
wcsstr
wcsncmp
iswspace
iswalnum
iswalpha
malloc
free
_wcsnicmp
wcschr
_purecall
_wcsicmp
memcpy
memcmp
_ftol2_sse
_ftol2
_CxxThrowException
_wtol
_ultow_s
_wfopen
_get_osfhandle
_fileno
_waccess
_wrename
fclose
fread
fwrite
fseek
_XcptFilter
_amsg_exit
_initterm
?terminate@@YAXXZ
_except_handler4_common
??1type_info@@UAE@XZ
_lock
__CxxFrameHandler3
_unlock
__dllonexit
_onexit
memmove
_wsplitpath_s
memset
msdart
FXMemDetach
MpGetHeapHandle
FXMemAttach
MpHeapReAlloc
MPInitializeCriticalSection
UMSEnterCSWraper
MPDeleteCriticalSection
?ReadUnlock@CReaderWriterLock3AR@@QAEXXZ
?ReadLock@CReaderWriterLock3AR@@QAEXXZ
?ReadOrWriteUnlock@CReaderWriterLock3AR@@QAEX_N@Z
?ReadOrWriteLock@CReaderWriterLock3AR@@QAE_NXZ
?WriteUnlock@CReaderWriterLock3AR@@QAEXXZ
?WriteLock@CReaderWriterLock3AR@@QAEXXZ
??1CReaderWriterLock3AR@@QAE@XZ
??0CReaderWriterLock3AR@@QAE@XZ
MpHeapAlloc
MpHeapFree
kernel32
IsDebuggerPresent
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
DeleteFileW
CompareStringW
CreateThreadpoolTimer
CreateSemaphoreExW
CreateMutexExW
GetWindowsDirectoryW
LCMapStringW
TlsFree
TlsAlloc
GetModuleFileNameW
OpenSemaphoreW
InitializeCriticalSectionEx
WaitForSingleObjectEx
CloseThreadpoolTimer
WaitForThreadpoolTimerCallbacks
SetThreadpoolTimer
ReleaseMutex
ReleaseSemaphore
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
OutputDebugStringW
GetModuleHandleW
GetModuleHandleExW
HeapFree
GetProcessHeap
HeapAlloc
FormatMessageW
LoadLibraryExW
DebugBreak
FreeLibrary
GetCurrentProcessId
DeleteCriticalSection
GetProcAddress
HeapDestroy
SearchPathA
GetSystemDirectoryA
DisableThreadLibraryCalls
GetLastError
WaitForSingleObject
GetFullPathNameA
InitializeCriticalSection
LoadLibraryExA
GetDriveTypeA
TlsSetValue
TlsGetValue
CloseHandle
CreateThread
GetCurrentThreadId
GetUserDefaultLCID
VirtualProtect
VirtualAlloc
VirtualQuery
GetSystemInfo
LeaveCriticalSection
MultiByteToWideChar
WideCharToMultiByte
Sleep
GetFullPathNameW
GetTempFileNameW
CreateFileW
GetFileType
WriteFile
ReadFile
GetFileTime
GetModuleFileNameA
SetLastError
EnterCriticalSection
OutputDebugStringA
user32
UnregisterClassW
DefWindowProcW
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongW
GetWindow
GetDesktopWindow
MessageBoxW
MsgWaitForMultipleObjects
LoadStringW
DispatchMessageW
GetActiveWindow
PostMessageW
PeekMessageW
CreateWindowExW
RegisterClassExW
TranslateMessage
DestroyWindow
advapi32
RegisterTraceGuidsW
RegQueryValueExW
SetFileSecurityW
GetFileSecurityW
RegGetValueA
RegQueryValueExA
RegCloseKey
UnregisterTraceGuids
RegOpenKeyExA
RegOpenKeyExW
ole32
CreateFileMoniker
CreateBindCtx
CoTaskMemFree
CoUninitialize
CoInitialize
CoCreateInstance
CoCreateFreeThreadedMarshaler
CoTaskMemAlloc
oleaut32
VariantCopy
SafeArrayUnlock
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
GetErrorInfo
VariantClear
VariantChangeType
LoadRegTypeLi
VariantInit
SetErrorInfo
SafeArrayRedim
SafeArrayDestroy
SysStringByteLen
SafeArrayPutElement
SafeArrayGetElement
CreateErrorInfo
LoadTypeLi
OaBuildVersion
SysReAllocStringLen
SafeArrayCopy
SafeArrayCreate
SafeArrayLock
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RNIGetCompatibleVersion
com_ms_wfc_data_Field_getBoolean
com_ms_wfc_data_Field_getByte
com_ms_wfc_data_Field_getBytes
com_ms_wfc_data_Field_getDataTimestamp
com_ms_wfc_data_Field_getDouble
com_ms_wfc_data_Field_getFloat
com_ms_wfc_data_Field_getInt
com_ms_wfc_data_Field_getLong
com_ms_wfc_data_Field_getShort
com_ms_wfc_data_Field_getString
com_ms_wfc_data_Field_isNull
com_ms_wfc_data_Field_loadMsjava
com_ms_wfc_data_Field_setDataDate
Sections
.text Size: 906KB - Virtual size: 906KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdbid Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ