d:\OutMyFile\分割后\DownDLLGoto.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2670a217d350216d2c0cb183a6fc051e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2670a217d350216d2c0cb183a6fc051e.exe
Resource
win10v2004-20240226-en
General
-
Target
2670a217d350216d2c0cb183a6fc051e
-
Size
316KB
-
MD5
2670a217d350216d2c0cb183a6fc051e
-
SHA1
ad31d862d8bbdd4b0c8bc9e645b58f611f9d07ea
-
SHA256
924edaa5d4da813fae6d7d7761352c385af244d4d602560df87f3034173c977f
-
SHA512
4b0b3038822defe1fba513e4fed804735a5872f16b5117a7be9b61d894b68b7c2201b213f43e952e5a64df64e8bdf0f2d2889c7238d2014799cb53691796d1cc
-
SSDEEP
6144:dnMfIq+XLROUxHXGmUReIyZyCcgHuVzOaO+tZG5:dMgZXNOUBXXRTOAz+G5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2670a217d350216d2c0cb183a6fc051e
Files
-
2670a217d350216d2c0cb183a6fc051e.exe windows:5 windows x86 arch:x86
266d07f5999dcac512ddb11cd8b8b4e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
GetPrivateProfileIntW
GetPrivateProfileStringW
CreateThread
Sleep
LoadLibraryW
OutputDebugStringW
MultiByteToWideChar
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
RemoveDirectoryW
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
WideCharToMultiByte
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleA
GetProcAddress
LoadLibraryA
CreateProcessW
WriteFile
SetFilePointer
CreateFileW
CopyFileW
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
RtlUnwind
FreeLibrary
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
GetVersion
GlobalMemoryStatus
GetVersionExA
MoveFileW
DeleteFileW
CloseHandle
GetTickCount
WriteProfileStringW
GetCommandLineW
WritePrivateProfileStringW
SetEndOfFile
user32
GetProcessWindowStation
GetDesktopWindow
wsprintfW
MessageBoxA
GetUserObjectInformationW
shlwapi
StrStrIW
advapi32
ReportEventA
DeregisterEventSource
RegisterEventSourceA
Sections
.text Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ