D:\lijiankai\IX1000\Host\Windows\Drivers\Windows\release\TouchMateEx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b87e91e4886e5a4c275d39db73fd7cc3da726df091dadcf3f24c9690118b55f0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b87e91e4886e5a4c275d39db73fd7cc3da726df091dadcf3f24c9690118b55f0.exe
Resource
win10v2004-20240319-en
General
-
Target
b87e91e4886e5a4c275d39db73fd7cc3da726df091dadcf3f24c9690118b55f0
-
Size
8KB
-
MD5
dcfe569cd63efdc33a42dcecd56cd344
-
SHA1
d365f5fc4821355d95c885a3d90c8566a2916db7
-
SHA256
b87e91e4886e5a4c275d39db73fd7cc3da726df091dadcf3f24c9690118b55f0
-
SHA512
02ac24b342b788c75b399f3bbbaa031c5f835e82e8433da5ffddf6ddece0236cf2ecfd84d777b38d3df7277c27dd0fc304f8bf82c388927ee9f9d191193a8db7
-
SSDEEP
96:SEyf+e6ZV4zcWiONEgydlnCWVABt0c2zEXs6XqEXHyg45ri6Wlo3Y8CtM:nyGONA/nC4jesYqgHL45ri6WSIXM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b87e91e4886e5a4c275d39db73fd7cc3da726df091dadcf3f24c9690118b55f0
Files
-
b87e91e4886e5a4c275d39db73fd7cc3da726df091dadcf3f24c9690118b55f0.exe windows:5 windows x86 arch:x86
dda3a9b015cc1f0a9daa1a6213f6c44b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
hid
HidD_GetHidGuid
kernel32
Process32FirstW
OpenProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
TerminateProcess
CreateEventW
GetModuleFileNameA
Process32NextW
WTSGetActiveConsoleSessionId
CreateToolhelp32Snapshot
GetCurrentProcess
CloseHandle
WaitForSingleObject
user32
DispatchMessageW
RegisterClassW
CreateWindowExW
RegisterDeviceNotificationW
DefWindowProcW
DestroyWindow
GetMessageW
PostQuitMessage
LoadCursorW
TranslateMessage
LoadIconW
UnregisterDeviceNotification
gdi32
GetStockObject
advapi32
SetTokenInformation
CreateProcessAsUserA
RegisterServiceCtrlHandlerW
SetServiceStatus
QueryServiceStatus
DuplicateTokenEx
StartServiceW
OpenProcessToken
OpenServiceW
StartServiceCtrlDispatcherW
OpenSCManagerW
CloseServiceHandle
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
msvcr100
wcsstr
strrchr
strcat_s
wcscpy_s
memset
_crt_debugger_hook
_wcsupr
_wcslwr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 422B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ