eplgOutlook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd.dll
Resource
win10v2004-20241007-en
General
-
Target
f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd.exe
-
Size
1.6MB
-
MD5
86b57c9deafed093d4b47b03823b4d14
-
SHA1
47947da463dd6f4ecf61ae960235a35144e903a8
-
SHA256
f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd
-
SHA512
5f855ed0a3ecf561c45608d7f4579d6e4b1f1953863e97e0b5fea1f33b38d0e03fef16207d88864d2d936a4e65b677cd259ec248dbf06447b50f9e0488acead3
-
SSDEEP
24576:M7u7nB/DBD9accSqVO9y/QaDC4F3Zuk5UDJjbDE2W4VO8I/nYY:My/DBD9MVO9yosHF395UlbDBw82nB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd.exe
Files
-
f8e3eef1fda5969a7aabcc8fb5cc9f5fe245bbf6cc8e480459977b8e91eab9bd.exe.dll windows:6 windows x64 arch:x64
cba5c505da2537f7a4d0d6fd4d118e5d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualAllocExNuma
ReleaseSemaphore
CreateTimerQueueTimer
DeleteTimerQueueTimer
RaiseException
Sleep
GetTempPathW
FindFirstFileExW
FindNextFileW
FindClose
CreateDirectoryW
ReadFile
WriteFile
SetEndOfFile
SetFilePointer
GetFileSize
DeleteFileW
MoveFileW
GetTempFileNameW
FlushFileBuffers
SetFileAttributesW
GetFileInformationByHandle
FindFirstFileW
GetSystemInfo
ReleaseMutex
OpenMutexW
FreeResource
GetLocaleInfoW
GetTimeZoneInformation
WideCharToMultiByte
GetDateFormatW
CreateSemaphoreW
ExpandEnvironmentStringsA
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapSize
GetOEMCP
GetACP
IsValidCodePage
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
InterlockedFlushSList
RtlUnwindEx
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
GetCPInfo
GetStringTypeW
LCMapStringEx
GetNativeSystemInfo
AreFileApisANSI
GetFileAttributesExW
GetLocaleInfoEx
HeapReAlloc
HeapDestroy
FreeLibrary
QueryActCtxW
GetModuleFileNameW
LoadLibraryW
LoadLibraryExW
FindResourceExW
FindResourceW
SizeofResource
LockResource
LoadResource
MultiByteToWideChar
SetFileTime
MoveFileExW
GetCurrentThreadId
GetExitCodeThread
SetThreadPriority
OutputDebugStringA
HeapFree
HeapAlloc
GetProcessHeap
OpenProcess
LocalFree
GetEnvironmentVariableW
OpenFileMappingW
UnmapViewOfFile
MapViewOfFile
OpenEventW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
WaitForMultipleObjects
WaitForSingleObject
ResetEvent
SetEvent
GetCurrentProcessId
VerifyVersionInfoW
VerSetConditionMask
GetCurrentProcess
GetLastError
GetCurrentThread
GetModuleHandleW
GetTickCount
InitializeCriticalSection
FormatMessageA
GetProcAddress
GetCommandLineA
SetLastError
user32
GetPropW
GetWindowRect
RegisterWindowMessageW
PostQuitMessage
GetClassInfoW
GetClientRect
LoadIconW
GetForegroundWindow
GetWindowLongPtrW
FindWindowExW
GetQueueStatus
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
EnumChildWindows
MsgWaitForMultipleObjects
TranslateMessage
IsDlgButtonChecked
CheckDlgButton
ReleaseDC
DrawTextW
GetDC
GetProcessDefaultLayout
GetClassNameW
LoadImageW
DialogBoxIndirectParamW
EndDialog
CreateDialogIndirectParamW
GetDlgItem
ScreenToClient
SetWindowTextW
SetActiveWindow
MapWindowPoints
GetDesktopWindow
MonitorFromWindow
GetWindow
GetParent
SendMessageW
SetWindowLongW
SetWindowPos
GetWindowLongW
SetPropW
RegisterClassExW
LoadCursorW
PeekMessageW
gdi32
DeleteDC
CreateCompatibleDC
GetObjectW
SelectObject
DeleteObject
CreateDIBSection
advapi32
RegQueryInfoKeyW
RegEnumValueA
RegEnumKeyExA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
SetThreadToken
RevertToSelf
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
shell32
ShellExecuteExW
ole32
StgCreateDocfile
WriteClassStg
oleaut32
OleCreatePictureIndirect
VariantInit
VariantClear
VariantChangeType
SysAllocString
SysFreeString
Exports
Exports
Object
DllGetClassObject
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ