E:\course\网络防御课程\大四本科ppt\实验素材\实验6.2\任务2\SEUServer\Server\Debug\Server.pdb
Static task
static1
Behavioral task
behavioral1
Sample
37da609211b6073b697b836b6fcf80628d1f74887e456f3eb0583e9e1d04d87d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37da609211b6073b697b836b6fcf80628d1f74887e456f3eb0583e9e1d04d87d.exe
Resource
win10v2004-20231215-en
General
-
Target
37da609211b6073b697b836b6fcf80628d1f74887e456f3eb0583e9e1d04d87d
-
Size
514KB
-
MD5
924d697ad1379b54a919e85c04df18f2
-
SHA1
35efaa067bed1c5e289ee9fdda586e72edcaeebb
-
SHA256
37da609211b6073b697b836b6fcf80628d1f74887e456f3eb0583e9e1d04d87d
-
SHA512
564295e4af74fdad8c68186f4f8fb5c33fc03d649e6e8daa39bd3283ec77298c630a5e3c32f338ae0ad328c3533d72dd65f35dbddc7f84f61eaecee6b731c3bc
-
SSDEEP
12288:lEgXoaStfuZ5ou0ShecHp4Pvbwfxx5m2j9Hj:hfSuZWqIkpAbwfx6OHj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37da609211b6073b697b836b6fcf80628d1f74887e456f3eb0583e9e1d04d87d
Files
-
37da609211b6073b697b836b6fcf80628d1f74887e456f3eb0583e9e1d04d87d.exe windows:5 windows x86 arch:x86
fc6c2c89a422be933534afe819cc4217
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualAlloc
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
TerminateThread
GlobalLock
GlobalSize
ExitProcess
GetVersionExA
GetComputerNameA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
CreateFileW
LCMapStringW
IsDebuggerPresent
GetCurrentProcess
CheckRemoteDebuggerPresent
WinExec
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
ReadFile
GlobalAlloc
GlobalReAlloc
GetTempPathA
GlobalFree
GetModuleFileNameA
CreateThread
Sleep
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
GlobalUnlock
GetDriveTypeA
GetStringTypeW
GetLocaleInfoW
InterlockedExchange
GetExitCodeProcess
CreateFileA
HeapQueryInformation
HeapSize
HeapReAlloc
FlushFileBuffers
SetStdHandle
FreeLibrary
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
SetConsoleCtrlHandler
GetUserDefaultLCID
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
HeapDestroy
HeapCreate
GetSystemTimeAsFileTime
GetFileAttributesA
RtlUnwind
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EncodePointer
GetModuleFileNameW
WideCharToMultiByte
MultiByteToWideChar
RaiseException
lstrlenA
GetProcAddress
LoadLibraryW
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetConsoleCP
GetConsoleMode
HeapValidate
IsBadReadPtr
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
FatalAppExitA
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FreeEnvironmentStringsW
GetEnvironmentStringsW
user32
GetSystemMetrics
mouse_event
keybd_event
IsRectEmpty
ReleaseDC
GetDC
SetCursorPos
gdi32
GetStockObject
GetObjectA
SelectPalette
RealizePalette
GetDIBits
CreateDCA
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
DeleteObject
advapi32
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
ControlService
DeleteService
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
shell32
ShellExecuteA
SHGetFileInfoA
ws2_32
htons
WSASocketA
WSACleanup
WSAStartup
shutdown
closesocket
connect
inet_addr
send
recv
listen
select
inet_ntop
getaddrinfo
socket
bind
freeaddrinfo
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.textbss Size: - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 398KB - Virtual size: 398KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ