c:\earlyCommon\beganLeg\ForwardPlane\OperateNation\Yarddark\substance.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9f38af84820dc29e805029409bbb2a5765036775973e3898b6db1f66c1b47270.dll
Resource
win7-20240729-en
General
-
Target
0619b0b3b9ad8c87bb66e75cb036d7a6edaef2a6d170ea3ef91176316991aec4.zip
-
Size
481KB
-
MD5
7294e88d89543cec05bcb86faf673c6e
-
SHA1
bc6fc37589cf893d7d49814c1fe8879166623c2b
-
SHA256
0619b0b3b9ad8c87bb66e75cb036d7a6edaef2a6d170ea3ef91176316991aec4
-
SHA512
f84a576394ebcdbb6dbccccd034f6a0fffc6b2e33291c67d7aab43458da2d64af397174755c40727efb7c80d5d2e1d5c2349605a8be2324f67e0c0f4bafda907
-
SSDEEP
12288:P7+VMYZ6J3ikPpf7PmrgF/B0pV9NqHcX+/ZSuy/gV8ESXS+LIP:PKe06J3ikPpDesF5Ar7uhYSLP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9f38af84820dc29e805029409bbb2a5765036775973e3898b6db1f66c1b47270.dll
Files
-
0619b0b3b9ad8c87bb66e75cb036d7a6edaef2a6d170ea3ef91176316991aec4.zip.zip
Password: infected
-
9f38af84820dc29e805029409bbb2a5765036775973e3898b6db1f66c1b47270.dll.dll regsvr32 windows:6 windows x86 arch:x86
8c547040bfa7b5342bc2768d5dc42f8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FindFirstFileW
TlsGetValue
CreateProcessW
GetTickCount
Sleep
CopyFileW
GetStartupInfoW
OpenMutexW
FindClose
FindNextFileW
VirtualProtect
TlsAlloc
CloseHandle
DeleteFileW
GetLastError
HeapFree
HeapAlloc
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineA
GetCurrentThreadId
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
MultiByteToWideChar
GetProcessHeap
CreateFileW
GetFileType
GetModuleHandleW
GetProcAddress
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
GetStdHandle
WriteFile
GetModuleFileNameW
HeapSize
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsSetValue
TlsFree
GetStringTypeW
LCMapStringW
GetConsoleCP
GetConsoleMode
SetEndOfFile
ReadFile
ReadConsoleW
SetFilePointerEx
LoadLibraryExW
OutputDebugStringW
WriteConsoleW
FlushFileBuffers
Exports
Exports
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 479KB - Virtual size: 479KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ