c:\938\follow-Record\Suffix\observe-element\force.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4.dll
Resource
win7-20240903-en
General
-
Target
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4
-
Size
937KB
-
MD5
9a8457b3a9c9d71e11ab219de1c8d503
-
SHA1
04a43d7bbb61082d832be616de6728b54619a26d
-
SHA256
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4
-
SHA512
572bf667f4b611d74e43965295f316bf11e7bbe955f572a6105055d7dc88456ac78c3924b7410b5507f77eb9a30283622a45d719a8cacfa41a83477f6de34d63
-
SSDEEP
24576:HQfpzjXPgft8CJV4X+IBIJ3cazaLwj1mCG9CpNiLi:IFDgBJV4OaIRj150CpNiLi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4
Files
-
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4.dll windows:6 windows x86 arch:x86
7a79d10b1d4343a18a4f6e25e165b4ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetProcessHeap
CreateFileW
SetStdHandle
ReadConsoleW
WriteConsoleW
HeapSize
SetEndOfFile
SetEnvironmentVariableW
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
GetTimeZoneInformation
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
CreateSemaphoreA
GetSystemTimeAsFileTime
TlsGetValue
VirtualProtectEx
TlsAlloc
GetSystemDirectoryA
GetTempPathA
Sleep
GetCommandLineA
GetModuleHandleA
InitializeCriticalSection
SetSystemPowerState
EnterCriticalSection
VirtualProtect
GetModuleFileNameA
MultiByteToWideChar
GetLastError
FormatMessageW
WideCharToMultiByte
GetStringTypeW
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
GetCurrentThread
GetACP
GetStdHandle
GetFileType
CloseHandle
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
CreateProcessW
GetFileAttributesExW
WriteFile
GetConsoleCP
GetConsoleMode
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
ReadFile
SetFilePointerEx
HeapReAlloc
SetConsoleCtrlHandler
CreateThread
user32
SetFocus
GetCursorPos
RegisterClassExA
GetFocus
GetClassInfoExA
GetKeyNameTextA
GetWindowTextLengthA
CallWindowProcA
IsDlgButtonChecked
DestroyIcon
AppendMenuA
DrawIconEx
DrawEdge
gdi32
BitBlt
DeleteDC
CreatePen
DeleteObject
CreateDCA
GetObjectA
DPtoLP
ole32
OleUninitialize
OleSetContainedObject
OleInitialize
shlwapi
PathFindFileNameA
PathAddBackslashW
PathStripToRootA
dciman32
DCICreatePrimary
DCIOpenProvider
GetDCRegionData
DCISetDestination
DCICloseProvider
DCICreateOverlay
GetWindowRegionData
DCIEndAccess
WinWatchDidStatusChange
DCICreateOffscreen
DCISetSrcDestClip
DCIDestroy
DCIDraw
DCISetClipList
DCIEnum
DCIBeginAccess
WinWatchClose
Exports
Exports
Connectdark
Mindlake
Porthigh
Problemscale
WingGrass
Sections
.text Size: 545KB - Virtual size: 544KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 361KB - Virtual size: 361KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ