C:\Users\Administrator\Desktop\替换配置文件\w3wp-svchost\x64\Release\CbsMsgApi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cd33a523c49a10c689472e0c8f05a28e25dd056cbeb28b3a55efb2d34cc7bd75.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd33a523c49a10c689472e0c8f05a28e25dd056cbeb28b3a55efb2d34cc7bd75.dll
Resource
win10v2004-20240226-en
General
-
Target
cd33a523c49a10c689472e0c8f05a28e25dd056cbeb28b3a55efb2d34cc7bd75
-
Size
283KB
-
MD5
a3e77bae25031b6c9747cde78cdfa68f
-
SHA1
e59bad6caff65cfbd54f27b77ed7829c7c2fb28d
-
SHA256
cd33a523c49a10c689472e0c8f05a28e25dd056cbeb28b3a55efb2d34cc7bd75
-
SHA512
a9e2eaed60455fe52525300fa319e26e3c9c33df154ac7ea9e9353028c1c0ed01ad3bfe0059b1960973e5fb2a8b8656756145e3f51f72f33901666cf7113d430
-
SSDEEP
6144:fGe0f9dh56ZN36lFuHCuoWDJGwPMUT9oh45yiTuPV8/mKJr:Rm6ZZ6lsHCZs10UT9oC5yn4d9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd33a523c49a10c689472e0c8f05a28e25dd056cbeb28b3a55efb2d34cc7bd75
Files
-
cd33a523c49a10c689472e0c8f05a28e25dd056cbeb28b3a55efb2d34cc7bd75.dll windows:6 windows x64 arch:x64
993373a9abe7a91b35003542ad0156a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
WideCharToMultiByte
CreateEventA
GetExitCodeProcess
GetWindowsDirectoryA
SetEndOfFile
HeapSize
SetStdHandle
GetProcessHeap
CloseHandle
GetLastError
Wow64RevertWow64FsRedirection
CopyFileA
ResumeThread
WaitForSingleObject
ExpandEnvironmentStringsA
Wow64DisableWow64FsRedirection
WriteConsoleW
GetCurrentProcess
LocalFree
FormatMessageA
GetLocaleInfoEx
CreateFileW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetModuleHandleW
GetProcAddress
GetFileInformationByHandleEx
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetCurrentThreadId
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlUnwind
ReadFile
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetStdHandle
GetFileType
GetFileSizeEx
FlushFileBuffers
WriteFile
GetConsoleOutputCP
HeapFree
HeapAlloc
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
user32
FindWindowA
PostMessageA
advapi32
RevertToSelf
CreateProcessAsUserA
SetServiceStatus
RegisterServiceCtrlHandlerA
ImpersonateSelf
OpenProcessToken
DuplicateTokenEx
GetTokenInformation
Exports
Exports
ServiceCtrlHandler
ServiceMain
Sections
.text Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ