e:\JinZQ\技术研究+++++++++++++++++++++++++++++++++++++++++++\WebBrowser技术研究\WebDll-Project\WebDllx\Release\WebDllx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
95d8d3ba4ef9ec4eb41a705fbf5a7dda.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95d8d3ba4ef9ec4eb41a705fbf5a7dda.dll
Resource
win10v2004-20231222-en
General
-
Target
95d8d3ba4ef9ec4eb41a705fbf5a7dda
-
Size
160KB
-
MD5
95d8d3ba4ef9ec4eb41a705fbf5a7dda
-
SHA1
f620ed6496b8f0597edc4df04ee76b3aa1980002
-
SHA256
47d0e68e6d088a280ae14b21ad315ed83711be8d80811f7aed4a1c6dcb4f3c0b
-
SHA512
dd5a640fc57b2099b2c511876bc7fc454411fb27ff97acc492b42e5374fc596101f8fc0ea118efb37438527b74b720fca0fa6713fa698bb199c39837183cabd0
-
SSDEEP
3072:F4IhjWuTJiOrwI4vmh/KebDl+W6siyet6sbehYuqKfrf+O+067DI:FhhjfiHI4vmhFlVhi7thbwoa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95d8d3ba4ef9ec4eb41a705fbf5a7dda
Files
-
95d8d3ba4ef9ec4eb41a705fbf5a7dda.dll windows:4 windows x86 arch:x86
6c52fa02e6abb87d5ee6e005701d31dd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfc71
ord1084
ord1098
ord371
ord1175
ord762
ord293
ord577
ord764
ord266
ord265
ord1917
ord1187
ord1191
msvcr71
__CppXcptFilter
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
memset
strncpy
realloc
srand
rand
isspace
strchr
strpbrk
time
atoi
sprintf
_CxxThrowException
__CxxFrameHandler
memmove
_snprintf
printf
strstr
_access
_stricmp
_write
_close
_lseek
_open
free
malloc
_resetstkoflw
_except_handler3
_vscwprintf
vswprintf
wcslen
kernel32
HeapDestroy
HeapReAlloc
GetProcessHeap
InterlockedIncrement
InterlockedDecrement
MulDiv
FlushInstructionCache
GetCurrentProcess
HeapAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
GetModuleHandleA
FreeLibrary
HeapSize
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
ExitProcess
LocalFree
LoadLibraryA
CopyFileA
MoveFileExA
MoveFileA
GetCurrentThreadId
IsDBCSLeadByte
lstrcpynA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
lstrcmpiA
lstrlenW
lstrlenA
EnterCriticalSection
LeaveCriticalSection
GetPrivateProfileStringA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
GetPriorityClass
OpenProcess
OutputDebugStringW
GetTickCount
WritePrivateProfileStringA
Sleep
CreateThread
GetModuleFileNameA
Thread32Next
Thread32First
GetProcessId
CreateProcessA
GetWindowsDirectoryA
DeleteFileA
LoadLibraryExA
user32
ShowWindow
RegisterClassA
LoadIconA
MessageBoxA
GetWindowThreadProcessId
PeekMessageA
SetTimer
GetWindowTextA
SetWindowTextA
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
UpdateWindow
CharNextA
GetParent
GetClassNameA
PostQuitMessage
DestroyWindow
RedrawWindow
DestroyAcceleratorTable
GetDlgItem
SetFocus
GetFocus
IsChild
GetWindow
BeginPaint
EndPaint
CallWindowProcA
GetMessageA
GetWindowTextLengthA
CreateAcceleratorTableA
DispatchMessageA
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetWindowPos
RegisterWindowMessageA
SetCapture
ReleaseCapture
GetSysColor
DefWindowProcA
SendMessageA
CreateWindowExA
SetWindowLongA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
IsWindow
GetWindowLongA
UnregisterClassA
TranslateMessage
gdi32
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
DeleteObject
SelectObject
advapi32
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
shell32
ShellExecuteA
shlwapi
PathFileExistsA
ole32
OleUninitialize
OleInitialize
CoTaskMemRealloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoInitialize
CoCreateInstance
CoTaskMemFree
oleaut32
VarUI4FromStr
LoadTypeLi
SysFreeString
VariantClear
VariantCopy
VariantChangeType
VariantInit
SysAllocStringLen
SysAllocString
SysStringLen
SysStringByteLen
OleCreateFontIndirect
LoadRegTypeLi
psapi
GetModuleFileNameExA
Exports
Exports
EngineProc
process1
process2
process3
process5
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HookData Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ