E:\vs2010\远控\newmm\client\CallDll\x64\Release\twain_64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ee41eb21f439b1168ae815ca067ee91d84d6947397d71e214edc6868dbf4f272.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ee41eb21f439b1168ae815ca067ee91d84d6947397d71e214edc6868dbf4f272.dll
Resource
win10v2004-20240226-en
General
-
Target
ee41eb21f439b1168ae815ca067ee91d84d6947397d71e214edc6868dbf4f272.exe
-
Size
381KB
-
MD5
c19b3c9566bd76ee632a0ca16f7b66d2
-
SHA1
0c94c7f4b6fe5974ff852aeb885456fa8a4e3f89
-
SHA256
ee41eb21f439b1168ae815ca067ee91d84d6947397d71e214edc6868dbf4f272
-
SHA512
1874166a0257cab9557d0878321a12cf744c0b28b5dbcb457bf3cbbd738761830daa8cab5f22c45d6bd8c04975fd77dde7f97b6db0235949bfbda8b4fbb8fd30
-
SSDEEP
6144:sb/16fb9PK64LeFGK/T4MPMcAEP2Y2dxQTyjTjWh4MUTAp+7SqUusm:l9P96st/qczEYlM7Sqt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ee41eb21f439b1168ae815ca067ee91d84d6947397d71e214edc6868dbf4f272.exe
Files
-
ee41eb21f439b1168ae815ca067ee91d84d6947397d71e214edc6868dbf4f272.exe.dll windows:5 windows x64 arch:x64
938145366590c326ad28ef476d306ad3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
OpenProcess
lstrcatA
lstrcmpiA
Process32Next
CreateToolhelp32Snapshot
lstrcpyA
GetVersionExA
GetProcAddress
LoadLibraryA
GetSystemInfo
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
QueryPerformanceFrequency
WaitForSingleObject
SetEvent
CreateEventA
GetWindowsDirectoryA
GetModuleFileNameA
GetCurrentProcess
SystemTimeToTzSpecificLocalTime
GetPrivateProfileIntA
GetFileAttributesA
Process32First
MultiByteToWideChar
CreateDirectoryA
RemoveDirectoryA
GetPrivateProfileStringA
GetVersion
LocalFree
FreeLibraryAndExitThread
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetCurrentDirectoryW
SetCurrentDirectoryA
QueryDosDeviceA
lstrlenA
GetLogicalDriveStringsA
SetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
CopyFileA
FindFirstFileA
CreateThread
CreatePipe
GetSystemDirectoryA
ReadFile
CreateProcessA
Sleep
WriteFile
PeekNamedPipe
WritePrivateProfileStringA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
CloseHandle
GetFileTime
GetLastError
FileTimeToSystemTime
SetFileTime
FindResourceExW
SystemTimeToFileTime
CreateFileA
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceW
TerminateProcess
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeW
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
CreateFileW
GetExitCodeProcess
SetStdHandle
WriteConsoleW
GetStringTypeW
GetCurrentProcessId
HeapCreate
HeapSetInformation
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
LoadLibraryW
GetTimeZoneInformation
SetFilePointer
GetStartupInfoW
GetFileType
GetStdHandle
SetHandleCount
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
MoveFileA
FindFirstFileExA
GetModuleHandleW
ExitProcess
GetCurrentThreadId
FlsSetValue
GetCommandLineA
RtlPcToFileHeader
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsFree
SetLastError
FlsAlloc
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
GetSystemMetrics
advapi32
SetEntriesInAclA
GetUserNameA
RevertToSelf
ImpersonateLoggedOnUser
CreateProcessAsUserA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCloseKey
RegEnumValueA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
CreateWellKnownSid
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
DuplicateToken
GetTokenInformation
OpenProcessToken
ControlService
OpenSCManagerA
QueryServiceStatus
StartServiceA
EnumServicesStatusExA
CloseServiceHandle
OpenServiceA
LookupAccountSidA
ws2_32
ntohl
closesocket
ioctlsocket
connect
select
__WSAFDIsSet
gethostname
htonl
WSAStartup
gethostbyname
recv
send
WSAIoctl
recvfrom
inet_addr
htons
setsockopt
sendto
socket
shutdown
inet_ntoa
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesA
psapi
GetProcessImageFileNameA
netapi32
NetUserEnum
NetApiBufferFree
Sections
.text Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ