Note: this report may be incomplete because the AI analysis reached the following limit(s): token. # Summary The analyzed file #AID=41# is a 64-bit PE DLL that masquerades as a legitimate Microsoft component. It spoofs metadata to appear as the "Microsoft® Active Directory Certificate Services Sample Policy Module" (`CertPSam.dll`), a well-known sample from the Windows Driver Kit (WDK). However, deep static analysis reveals it has been heavily modified for malicious purposes. It implements a custom API resolver to dynamically load network-related functions, contains embedded cryptographic routines, and features a hardcoded URL pointing to a suspicious Hangul Word Processor (`.hwp`) file. The file operates as a malicious COM object, likely acting as a backdoor or downloader. # Key detections/IOCs * **SHA256:** `1fd921159de8ccf3c33c7ad3d52a4186c2695b858435e8e327c4d95a8d1b048a` * **Embedded URL:** `http://www.royalsevres.com/javascript/activex_patch.hwp` * **Anomalous Imports:** Resolved dynamically via hashing (`LoadLibraryA`, `InternetOpenA`, `InternetReadFile`, `InternetCloseHandle`). * **Spoofed Metadata:** Claims to be a Microsoft WDK component but lacks a valid digital signature (`UnsignedMicrosoft` anomaly). # Evidence 1. **API Hashing and Obfuscation:** The file contains a custom PEB-walking API resolver (`sub_180008440`) identified by the `ImportByHash` anomaly. Functions like `InternetOpenA` and `InternetReadFile` are not statically imported; instead, their hashes (e.g., `0x726774C`, `0xA779563A`) are passed to the resolver at runtime (`sub_1800086f0`). This technique is heavily utilized by malware to hide network exfiltration or secondary payload downloading capabilities from static analysis tools. 2. **Suspicious Embedded URL:** A highly specific and malicious-looking URL (`http://www.royalsevres.com/javascript/activex_patch.hwp`) is embedded in the `.rdata` section. The use of a `.hwp` (Hangul Word Processor) file disguised as an `activex_patch` is a common social engineering vector used in targeted attacks, particularly in East Asia. The URL is surrounded by legitimate COM registry strings, indicating the attacker embedded it directly into the sample's configuration or source code. 3. **Cryptographic Capabilities:** The binary embeds multiple AES/Rijndael substitution boxes and T-tables (`crypto::Rijndael_Td*`), alongside `XorInLoop` and `StackArrayInitialisationX64` anomalies. This suggests the DLL has built-in capabilities to decrypt configurations or communicate with a C2 server securely. 4. **Spoofed Legitimacy:** While the `VersionInfo` and `ProductName` claim it is an official Microsoft driver sample, the `UnsignedMicrosoft` anomaly confirms it is not signed by Microsoft. The debug compilation date of `2024-10-28` further proves this is a recent rebuild of the sample, compiled with MSVC 2019 and modified to include malicious backdoors. 5. **Structure:** Despite the malicious additions, the file faithfully implements the COM entry points (`DllRegisterServer`, `DllGetClassObject`) and Certificate Policy OIDs/GUIDs (`ICertServerPolicy`), attempting to blend into a legitimate Active Directory Certificate Services (AD CS) environment as a rogue policy module. # Verdict **Malicious (Confidence: 95%)** The file is a backdoored version of the official Microsoft `CertPSam` sample DLL. While it retains the structural skeleton of a valid COM Certificate Policy Module to evade suspicion, it incorporates advanced stealth techniques (API hashing), cryptographic libraries, and an embedded URL to download a weaponized `.hwp` document. It is classified as a malicious downloader/loader disguised as a system component.