Static task
static1
Behavioral task
behavioral1
Sample
温州强强财富科技有限公司关于合合Textln智能文字识别产品采购详细问题汇总——2023年7月10日.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
温州强强财富科技有限公司关于合合Textln智能文字识别产品采购详细问题汇总——2023年7月10日.exe
Resource
win10v2004-20230703-en
General
-
Target
4a3f18aca429922237fd8babc70a8a99c25ad2e89dfaf60131b36c03de42b9a3
-
Size
235KB
-
MD5
ba2114c6ea2f3d746760398a8417b76c
-
SHA1
652e62406123eef16aa42ac0e45656b5120f01bd
-
SHA256
4a3f18aca429922237fd8babc70a8a99c25ad2e89dfaf60131b36c03de42b9a3
-
SHA512
66b0631686c2e57cfbe2f54fc4f32312a6b031fb7f153285c4a9d5f5d1426f4dfd2f467ac0b8eb98c24bcbfcf2b66327413f2e9944860904b2a3de417ff605e7
-
SSDEEP
6144:pf/YBndXVI6x9bYb1zUoa9o6ujSHEsgBCFLvGUO3:ZgBnpx9kBUjW6uzsBFW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/温州强强财富科技有限公司关于合合Textln智能文字识别产品采购详细问题汇总——2023年7月10日.exe
Files
-
4a3f18aca429922237fd8babc70a8a99c25ad2e89dfaf60131b36c03de42b9a3.7z
-
温州强强财富科技有限公司关于合合Textln智能文字识别产品采购详细问题汇总——2023年7月10日.exe.exe windows x64
c4e9ea639702b9542c3ea62d13e7f13d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetConsoleOutputCP
FlushFileBuffers
HeapSize
LCMapStringW
GetProcessHeap
HeapAlloc
ReleaseSRWLockExclusive
CompareStringW
SwitchToThread
GetStringTypeW
GetFileType
SetStdHandle
WaitForSingleObject
AcquireSRWLockExclusive
SetEnvironmentVariableW
FreeEnvironmentStringsW
SetThreadStackGuarantee
WakeAllConditionVariable
SleepConditionVariableSRW
WakeConditionVariable
GetSystemInfo
AddVectoredExceptionHandler
SwitchToFiber
CreateFiber
ConvertThreadToFiber
GetModuleHandleA
GetProcAddress
TryEnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetConsoleMode
WriteFile
WriteConsoleW
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetCurrentProcess
ReleaseMutex
SetLastError
GetEnvironmentVariableW
RtlLookupFunctionEntry
GetModuleHandleW
FormatMessageW
GetCommandLineW
VirtualProtect
GetFullPathNameW
CreateFileW
InitializeCriticalSection
EnterCriticalSection
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
SetHandleInformation
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentDirectoryW
GetCurrentThread
RtlCaptureContext
AcquireSRWLockShared
ReleaseSRWLockShared
CreateThread
GetDriveTypeW
GetVolumeInformationW
DeviceIoControl
GetDiskFreeSpaceExW
GetProcessTimes
FindClose
LocalFree
GetProcessIoCounters
OpenProcess
ReadProcessMemory
GetCommandLineA
GetModuleHandleExW
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount64
GetLastError
GlobalMemoryStatusEx
ExitProcess
RtlPcToFileHeader
MoveFileExW
SetFilePointerEx
GetUserDefaultLCID
LoadLibraryExW
GetLogicalDrives
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
RaiseException
EncodePointer
RtlUnwindEx
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcessId
IsDebuggerPresent
RtlVirtualUnwind
CloseHandle
InitializeSListHead
GetCurrentThreadId
HeapFree
GetModuleFileNameW
HeapReAlloc
pdh
PdhOpenQueryA
PdhCloseQuery
PdhRemoveCounter
PdhGetFormattedCounterValue
PdhLookupPerfNameByIndexW
PdhAddCounterW
PdhCollectQueryData
shell32
ShellExecuteW
CommandLineToArgvW
snmpapi
SnmpUtilMemAlloc
crypt32
CertGetCertificateChain
CertDuplicateStore
CertCloseStore
CertVerifyCertificateChainPolicy
CertEnumCertificatesInStore
CertAddCertificateContextToStore
CertDuplicateCertificateContext
CertDuplicateCertificateChain
CertFreeCertificateContext
CertOpenStore
CertFreeCertificateChain
secur32
EncryptMessage
AcquireCredentialsHandleA
DecryptMessage
FreeCredentialsHandle
FreeContextBuffer
DeleteSecurityContext
AcceptSecurityContext
InitializeSecurityContextW
QueryContextAttributesW
ws2_32
WSAGetLastError
getaddrinfo
connect
ioctlsocket
WSAStartup
freeaddrinfo
WSACleanup
WSASocketW
getsockopt
setsockopt
getpeername
send
closesocket
recv
select
getsockname
advapi32
RegQueryValueExA
SystemFunction036
bcrypt
BCryptGenRandom
ntdll
RtlGetVersion
NtQuerySystemInformation
NtQueryInformationProcess
ole32
CoUninitialize
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
powrprof
CallNtPowerInformation
iphlpapi
FreeMibTable
GetIfEntry2
GetIfTable2
netapi32
NetApiBufferFree
NetUserGetLocalGroups
NetQueryDisplayInformation
oleaut32
VariantClear
SysAllocString
SysFreeString
psapi
EnumProcessModulesEx
GetModuleFileNameExW
Sections
.text Size: 396KB - Virtual size: 395KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ