eplgOutlook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0f23855e56eb6ec760717be43280eeeeaec1aeef939f9ae6a41daf1b8e3bd306.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0f23855e56eb6ec760717be43280eeeeaec1aeef939f9ae6a41daf1b8e3bd306.dll
Resource
win10v2004-20241007-en
General
-
Target
0f23855e56eb6ec760717be43280eeeeaec1aeef939f9ae6a41daf1b8e3bd306.exe
-
Size
1.6MB
-
MD5
4f4a164b5f9ef20be601531a727179a2
-
SHA1
1601622dc7caef28ce413e1d73b4d4596aabfc50
-
SHA256
0f23855e56eb6ec760717be43280eeeeaec1aeef939f9ae6a41daf1b8e3bd306
-
SHA512
de09d9f0048a19c7efa7ffae01f58c41e619e09e6ec56e4b818b58846672a0772c58913ba5ad4c86b746d91399894a21bf51225c1737a0652b1c85ffa3307030
-
SSDEEP
24576:87u7nB/DBD9accSqVO9y/QaD74F3Zux5UDJpbD52hCvrHbvLz:8y/DBD9MVO9yos0F345UTbDukHvL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0f23855e56eb6ec760717be43280eeeeaec1aeef939f9ae6a41daf1b8e3bd306.exe
Files
-
0f23855e56eb6ec760717be43280eeeeaec1aeef939f9ae6a41daf1b8e3bd306.exe.dll windows:6 windows x64 arch:x64
c6afd9d09caec6adb6d76c79bb54e219
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
QueryFullProcessImageNameW
ReleaseSemaphore
CreateTimerQueueTimer
DeleteTimerQueueTimer
RaiseException
Sleep
GetTempPathW
FindFirstFileExW
FindNextFileW
FindClose
CreateDirectoryW
ReadFile
WriteFile
SetEndOfFile
SetFilePointer
GetFileSize
DeleteFileW
MoveFileW
GetTempFileNameW
FlushFileBuffers
SetFileAttributesW
GetFileInformationByHandle
FindFirstFileW
GetSystemInfo
ReleaseMutex
OpenMutexW
FreeResource
GetLocaleInfoW
GetTimeZoneInformation
WideCharToMultiByte
GetDateFormatW
CreateSemaphoreW
ExpandEnvironmentStringsA
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapSize
GetOEMCP
GetACP
IsValidCodePage
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
InterlockedFlushSList
RtlUnwindEx
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
VirtualAllocExNuma
GetCPInfo
GetStringTypeW
LCMapStringEx
GetNativeSystemInfo
AreFileApisANSI
GetFileAttributesExW
GetLocaleInfoEx
HeapReAlloc
HeapDestroy
FreeLibrary
QueryActCtxW
GetModuleFileNameW
LoadLibraryW
LoadLibraryExW
FindResourceExW
FindResourceW
SizeofResource
LockResource
LoadResource
MultiByteToWideChar
SetFileTime
MoveFileExW
GetCurrentThreadId
GetExitCodeThread
SetThreadPriority
OutputDebugStringA
HeapFree
HeapAlloc
GetProcessHeap
OpenProcess
LocalFree
GetEnvironmentVariableW
OpenFileMappingW
UnmapViewOfFile
MapViewOfFile
OpenEventW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
WaitForMultipleObjects
WaitForSingleObject
ResetEvent
SetEvent
GetCurrentProcessId
VerifyVersionInfoW
VerSetConditionMask
GetCurrentProcess
GetLastError
GetCurrentThread
GetModuleHandleW
GetTickCount
InitializeCriticalSection
FormatMessageA
GetProcAddress
GetCommandLineA
SetLastError
user32
GetPropW
GetWindowRect
RegisterWindowMessageW
PostQuitMessage
GetClassInfoW
GetClientRect
LoadIconW
GetForegroundWindow
GetWindowLongPtrW
FindWindowExW
GetQueueStatus
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
EnumChildWindows
MsgWaitForMultipleObjects
TranslateMessage
IsDlgButtonChecked
CheckDlgButton
ReleaseDC
DrawTextW
GetDC
GetProcessDefaultLayout
GetClassNameW
LoadImageW
DialogBoxIndirectParamW
EndDialog
CreateDialogIndirectParamW
GetDlgItem
ScreenToClient
SetWindowTextW
SetActiveWindow
MapWindowPoints
GetDesktopWindow
MonitorFromWindow
GetWindow
GetParent
SendMessageW
SetWindowLongW
SetWindowPos
GetWindowLongW
SetPropW
RegisterClassExW
LoadCursorW
PeekMessageW
gdi32
DeleteDC
CreateCompatibleDC
GetObjectW
SelectObject
DeleteObject
CreateDIBSection
advapi32
RegQueryInfoKeyW
RegEnumValueA
RegEnumKeyExA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
SetThreadToken
RevertToSelf
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
shell32
ShellExecuteExW
ole32
StgCreateDocfile
WriteClassStg
oleaut32
OleCreatePictureIndirect
VariantInit
VariantClear
VariantChangeType
SysAllocString
SysFreeString
Exports
Exports
Object
DllGetClassObject
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ