Static task
static1
Behavioral task
behavioral1
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
新云软件.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
金立网吧助手.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
金立网吧助手.exe
Resource
win10v2004-20231215-en
General
-
Target
04fd8ccf4a2cc8adea6d84495c42f45a
-
Size
5.4MB
-
MD5
04fd8ccf4a2cc8adea6d84495c42f45a
-
SHA1
492e4ea45c7dbb2473f488634df03ea86a9f240a
-
SHA256
63bc31a15a988f02915b809eaa69dd0909040cd7c4c3a313f225d1482211e3b2
-
SHA512
8ee9efdc4457ed83abdceaa8006148bff540e7a1ced7f051855e056566de2616c0b49445641bc17ad8193d7768d4130f6e36a3711c827648ce20a01213c46d64
-
SSDEEP
98304:rmrHzZ2vlVOuJAGp5Fh7W1tFnjTFZBZR/JVryshyiQox4JYXm3RxWrluczTVClBY:qoUuJAGp5XCtJRhVryssToXIWpRTVSBY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/金立网吧助手.exe
Files
-
04fd8ccf4a2cc8adea6d84495c42f45a.rar
-
新云软件.url.url
-
金立网吧助手.exe.exe windows:4 windows x86 arch:x86
899d30f70fe6a074a5e8be56a6462649
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
mciGetErrorStringA
mciSendCommandA
kernel32
WritePrivateProfileStringA
GetCurrentDirectoryA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
SetErrorMode
GetTickCount
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GlobalFlags
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
GetThreadLocale
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
lstrcmpW
GetModuleHandleA
GetProcAddress
FormatMessageA
MulDiv
SetLastError
FreeResource
GetShortPathNameA
lstrlenA
CompareStringW
CompareStringA
MultiByteToWideChar
InterlockedExchange
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
GetSystemDefaultLCID
CreateThread
SetThreadPriority
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
WriteFile
ReadFile
SetFilePointer
GetFileSize
GetLastError
OpenFile
_lclose
GlobalReAlloc
_llseek
LocalAlloc
LocalFree
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
_lread
GetCurrentProcess
CloseHandle
RemoveDirectoryA
GetComputerNameA
GetModuleFileNameA
Sleep
DeleteFileA
SetFileAttributesA
WinExec
CopyFileA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
CreateDirectoryA
SetCurrentDirectoryA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GetLocalTime
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVersion
GetVersionExA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
IsDebuggerPresent
user32
RegisterClipboardFormatA
PostThreadMessageA
CopyAcceleratorTableA
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorA
GetSysColorBrush
CharNextA
SetWindowContextHelpId
MapDialogRect
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
PtInRect
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowTextLengthA
GetWindowTextA
GetFocus
SetWindowPos
SetFocus
ShowWindow
MoveWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
CheckRadioButton
GetWindow
UnregisterClassA
MessageBeep
GetDesktopWindow
GetActiveWindow
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CharUpperA
DestroyIcon
ReleaseDC
ExitWindowsEx
GetSystemMetrics
SetWindowLongA
LoadIconA
KillTimer
SetTimer
GetDC
GetClientRect
IsIconic
DrawIcon
PostQuitMessage
GetParent
MessageBoxA
EnableWindow
SendMessageA
CopyRect
gdi32
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
PtVisible
CreatePen
CreateSolidBrush
CreateRectRgnIndirect
GetBkColor
GetTextColor
GetMapMode
GetRgnBox
GetClipBox
SetMapMode
GetWindowExtEx
GetViewportExtEx
CreateICA
GetObjectA
CreateFontIndirectA
SetTextColor
RestoreDC
SaveDC
Rectangle
PatBlt
SetDIBitsToDevice
GetStockObject
CreatePalette
SetBkMode
SetBkColor
CreateBitmap
DeleteObject
SelectPalette
RealizePalette
SelectObject
DeleteDC
AddFontResourceA
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
OpenProcessToken
RegCloseKey
AdjustTokenPrivileges
GetUserNameA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
ShellExecuteA
SHGetMalloc
SHGetFileInfoA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoTaskMemAlloc
OleInitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
oleaut32
VariantClear
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
SysAllocString
Sections
.text Size: 416KB - Virtual size: 415KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ