c:\MapTiny\touchAfter\SpellTook\UnitDictionary\Walk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
57120da92792471020573332d1ff30fadf4496f77e2652229c6dca7fc8685ae3.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
57120da92792471020573332d1ff30fadf4496f77e2652229c6dca7fc8685ae3.dll
Resource
win10v2004-20250314-en
General
-
Target
ae0fbe8d451ba698e7b3a2d801176ad0116d6e676a497f0964241d6d3a2e88f3.zip
-
Size
108KB
-
MD5
2137823e2849419344304f2e103c1c16
-
SHA1
77f6698b5a0f7fad6715af5f67cd6452535a3394
-
SHA256
ae0fbe8d451ba698e7b3a2d801176ad0116d6e676a497f0964241d6d3a2e88f3
-
SHA512
ea548d427050f155b8c18a2ddb5c0009500581468d186f49fda47eb30e8ec498b973b7f696e7ac6c725d9ec98af8e5bb8398b3105ae8078aa18fe8362be97ba0
-
SSDEEP
3072:mDfBNrSfZzCEeUY09+/lsMmzOT6If2sjNgx:eJNGfrYv/lYNG2sNW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/57120da92792471020573332d1ff30fadf4496f77e2652229c6dca7fc8685ae3.dll
Files
-
ae0fbe8d451ba698e7b3a2d801176ad0116d6e676a497f0964241d6d3a2e88f3.zip.zip
Password: infected
-
57120da92792471020573332d1ff30fadf4496f77e2652229c6dca7fc8685ae3.dll.dll regsvr32 windows:4 windows x86 arch:x86
d4bf80be98a2f6b0bb651ab156bf06f4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetEnvironmentVariableW
GetTempFileNameW
GetTickCount
LoadLibraryW
Sleep
CopyFileW
GetFileAttributesW
GetProcAddress
VirtualProtectEx
CreateSemaphoreW
WaitForMultipleObjects
GetShortPathNameW
CloseHandle
SetStdHandle
SetFilePointer
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
GetConsoleMode
GetLastError
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
GetTimeZoneInformation
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSection
RtlUnwind
LoadLibraryA
GetConsoleCP
CreateFileA
wininet
InternetCloseHandle
HttpOpenRequestW
HttpQueryInfoW
HttpAddRequestHeadersW
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetReadFile
InternetOpenW
Exports
Exports
Beautythis
DllRegisterServer
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ