E:\data\landun\workspace\p-8e18b00276fd470e835a1e79d9eeecd4\src\bin\sogoupdb\sogouinput\PinyinUp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ff0d7a0278ba2d651bb45a5531c70927d7da4b318a5908f8eeb11cc98f2819fb.exe
Resource
win7-20240221-en
General
-
Target
ff0d7a0278ba2d651bb45a5531c70927d7da4b318a5908f8eeb11cc98f2819fb
-
Size
2.8MB
-
MD5
7fd08957c83a8580cb5e120820b7d96c
-
SHA1
0d3873968c4c79920acc5068296a63f88d6a833f
-
SHA256
ff0d7a0278ba2d651bb45a5531c70927d7da4b318a5908f8eeb11cc98f2819fb
-
SHA512
9873ff3410768d03bdd77ac69fd181583ffe1932df8072c394bdb87fe52508ec181633ada182d5a469ebdbff14ac290f9868020b2be68723bdff0bc5183e9423
-
SSDEEP
49152:9ZOpxr3L/IKk76E74T07WtqAORrudaKZonjpy5aoSS5:7Gx7Jk76E7htJudaKym
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff0d7a0278ba2d651bb45a5531c70927d7da4b318a5908f8eeb11cc98f2819fb
Files
-
ff0d7a0278ba2d651bb45a5531c70927d7da4b318a5908f8eeb11cc98f2819fb.exe windows:6 windows x86 arch:x86
2b456d816bda7db23747efae2fd0ea61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
socket
setsockopt
ntohs
htons
getsockopt
htonl
getpeername
connect
bind
send
recv
WSAGetLastError
closesocket
WSACleanup
inet_addr
gethostname
gethostbyname
inet_ntoa
getservbyport
getservbyname
WSASetLastError
__WSAFDIsSet
select
accept
listen
recvfrom
sendto
ioctlsocket
getsockname
gethostbyaddr
WSAStartup
shlwapi
StrToIntW
StrStrIW
StrCmpIW
comctl32
InitCommonControlsEx
wininet
InternetConnectA
InternetReadFile
HttpAddRequestHeadersW
InternetSetCookieW
HttpSendRequestExW
HttpEndRequestW
InternetOpenW
InternetCrackUrlA
InternetWriteFile
HttpOpenRequestA
InternetCloseHandle
kernel32
GetExitCodeProcess
FindFirstFileW
FindNextFileW
FindClose
GetFileAttributesExW
GlobalMemoryStatusEx
lstrcpyW
CreateFileMappingW
WaitForMultipleObjects
FileTimeToSystemTime
ResetEvent
SystemTimeToTzSpecificLocalTime
SizeofResource
LoadResource
FindResourceW
FreeLibrary
lstrcmpiW
LoadLibraryExW
MulDiv
GetOEMCP
IsValidCodePage
SetEndOfFile
SetStdHandle
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
GetConsoleMode
GetACP
SetFilePointerEx
GetDriveTypeW
GetTimeZoneInformation
GetFullPathNameW
GetModuleHandleExW
ExitProcess
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
LoadLibraryExA
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentProcessId
WaitNamedPipeW
SetNamedPipeHandleState
CreateIoCompletionPort
TransactNamedPipe
GetQueuedCompletionStatus
WaitForSingleObjectEx
GetEnvironmentVariableW
ExpandEnvironmentStringsW
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualQuery
lstrcatW
TerminateProcess
ExpandEnvironmentStringsA
PeekNamedPipe
GetFileType
GetStdHandle
FormatMessageA
LoadLibraryA
GetSystemDirectoryA
SetErrorMode
InitializeCriticalSection
LocalFree
CreateMutexW
GetCurrentProcess
GetCommandLineW
OpenMutexW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetSystemDirectoryW
GetTempFileNameW
WideCharToMultiByte
GetModuleHandleW
DeleteFileW
MultiByteToWideChar
GetTempPathW
SetFilePointer
WriteFile
ReadFile
Sleep
HeapSize
ResumeThread
GetVersionExW
GetCurrentThreadId
lstrlenA
LeaveCriticalSection
lstrcpynW
EnterCriticalSection
GetTickCount
GlobalFree
GlobalAlloc
SetLastError
GetProcessHeap
GetProcAddress
HeapAlloc
LoadLibraryW
HeapReAlloc
HeapFree
GetLocalTime
DeleteCriticalSection
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
DebugBreak
SleepEx
TryEnterCriticalSection
GetSystemTime
lstrlenW
CreateFileW
CloseHandle
SetEvent
CreateEventW
OpenEventW
WaitForSingleObject
GetLastError
GetDiskFreeSpaceExW
VirtualAlloc
VirtualFree
QueryPerformanceCounter
QueryPerformanceFrequency
SuspendThread
MapViewOfFile
UnmapViewOfFile
OpenFileMappingW
FlushFileBuffers
SetFileAttributesW
CreateDirectoryW
GetLogicalDriveStringsW
OpenProcess
RemoveDirectoryW
QueryDosDeviceW
ReleaseMutex
LocalAlloc
GetFileTime
CopyFileW
CreateProcessW
lstrcpynA
HeapDestroy
MoveFileExW
GetFileAttributesW
GetProcessId
GetStringTypeW
OutputDebugStringW
GetFileSize
CreateThread
FormatMessageW
ExitThread
DuplicateHandle
GetModuleHandleA
SwitchToThread
GetCurrentDirectoryW
FindFirstFileExW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WriteConsoleW
user32
GetKeyboardLayoutList
ReleaseDC
FindWindowW
SystemParametersInfoW
IntersectRect
FillRect
GetParent
EnableWindow
GetMessageW
LoadMenuW
DestroyWindow
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetDlgItem
LoadImageW
IsWindowVisible
EnumDisplayMonitors
EnumDisplayDevicesW
EnumDisplaySettingsW
GetWindowLongW
GetMenuItemInfoW
DefWindowProcW
GetSystemMenu
CallWindowProcW
PostMessageW
SetWindowPos
MessageBoxW
GetMenuItemCount
LoadStringA
CreateWindowExW
SendMessageW
EndDialog
SetWindowTextW
MessageBeep
CreatePopupMenu
RegisterClassExW
DrawIcon
ShowWindow
SetClassLongW
IsWindow
SetTimer
wvsprintfW
DestroyIcon
CopyRect
SetMenuItemInfoW
PeekMessageW
MapWindowPoints
SetMenuDefaultItem
MoveWindow
LoadBitmapW
DestroyMenu
SetFocus
CharNextW
TranslateAcceleratorW
LoadIconW
LoadCursorW
SetCursor
SetWindowLongW
TrackPopupMenuEx
RemoveMenu
GetClientRect
AppendMenuW
DrawTextW
KillTimer
PostQuitMessage
EnableMenuItem
GetClassInfoExW
PtInRect
UpdateWindow
InvalidateRect
BeginPaint
EndPaint
GetWindowTextW
UnregisterClassW
LoadStringW
wsprintfW
SubtractRect
MonitorFromPoint
GetWindowRect
GetDC
GetSystemMetrics
GetMonitorInfoW
SetRectEmpty
gdi32
GetTextMetricsW
DPtoLP
SelectObject
SetTextColor
SetBkMode
LineTo
CreatePen
MoveToEx
DeleteObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
advapi32
CryptAcquireContextW
CryptDecrypt
CryptSetKeyParam
CryptDestroyKey
CryptEncrypt
RegEnumKeyW
GetLengthSid
AddAccessAllowedAceEx
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptImportKey
CryptReleaseContext
SetSecurityInfo
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorSacl
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclW
BuildExplicitAccessWithNameW
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyW
RegCreateKeyExW
RegSetValueExW
RegEnumValueW
EqualSid
AllocateAndInitializeSid
OpenProcessToken
FreeSid
LookupAccountSidW
GetTokenInformation
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
SHFileOperationW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
ole32
CoInitializeEx
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
CoInitialize
oleaut32
SysStringLen
SysAllocString
SysFreeString
VariantInit
VarUI4FromStr
imm32
ImmDisableIME
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetProcessMemoryInfo
wldap32
ord50
ord60
ord211
ord46
ord143
ord301
ord200
ord41
ord30
ord79
ord35
ord33
ord32
ord27
ord22
ord26
setupapi
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInstanceIdW
SetupDiGetClassDevsExW
SetupDiOpenDevRegKey
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 568KB - Virtual size: 568KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 807KB - Virtual size: 808KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE