sxsoa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
13e5eaef2216202b8111f3a394aa47207658466f15463976d7a3c45de9dda584.dll
Resource
win7-20241010-en
General
-
Target
13e5eaef2216202b8111f3a394aa47207658466f15463976d7a3c45de9dda584.exe
-
Size
90KB
-
MD5
d9de1e9ad5ecb98eff480156ed43622d
-
SHA1
e72e1fa1437dacbbd231ac403c8435bc56aa7c6a
-
SHA256
13e5eaef2216202b8111f3a394aa47207658466f15463976d7a3c45de9dda584
-
SHA512
30b90b2a3ce6dc9c1f4ba1610c7b97a67d3273d1f8b2923a5813bda4b44963d6ff683591cf2b0b7956655ac03c4e22e3509f97259afb2a1d3f7658f240a5dfd0
-
SSDEEP
1536:pszv184cUdfxY0M5uS4H6wiCIREos/5UyMG/42lc/ft06dmo/6Ow:yzN9c2m0M5uSdPCIRHshUjGncd0OzSOw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13e5eaef2216202b8111f3a394aa47207658466f15463976d7a3c45de9dda584.exe
Files
-
13e5eaef2216202b8111f3a394aa47207658466f15463976d7a3c45de9dda584.exe.dll regsvr32 windows:6 windows x86 arch:x86
a3e37d8f425f1f7a2c9c90c6a8f932ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcschr
??_U@YAPAXI@Z
_purecall
_except_handler4_common
__CxxFrameHandler3
??2@YAPAXI@Z
realloc
??3@YAXPAX@Z
_XcptFilter
free
malloc
?terminate@@YAXXZ
_initterm
memcpy
_amsg_exit
??_V@YAXPAX@Z
memset
user32
CharNextA
CharPrevA
kernel32
LoadResource
RegEnumKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
Sleep
GetFullPathNameW
CreateFileW
WriteFile
CloseHandle
InterlockedExchange
GetVersionExA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetLastError
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LoadLibraryA
GetProcAddress
GetModuleHandleA
lstrlenA
IsDBCSLeadByte
lstrcmpiA
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
DisableThreadLibraryCalls
lstrcatA
lstrcpynA
lstrcpyA
GetModuleFileNameA
FreeLibrary
SizeofResource
InterlockedCompareExchange
FindResourceA
LoadLibraryExA
GetTempFileNameW
GetTempPathW
oleaut32
VariantChangeType
VariantClear
LoadRegTypeLi
SysStringLen
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
SysStringByteLen
ole32
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateFreeThreadedMarshaler
CoCreateInstance
CoCreateInstanceEx
CLSIDFromProgID
MkParseDisplayName
CreateBindCtx
urlmon
CreateURLMoniker
URLDownloadToFileW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE