C:\Users\john\Desktop\Kite_20171025\Release\Kite3(有自启动).pdb
Static task
static1
Behavioral task
behavioral1
Sample
27032f1dd34ac61c7c01fee7ed966dddab2be93a2ea405277f4a3c36775a4fb8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27032f1dd34ac61c7c01fee7ed966dddab2be93a2ea405277f4a3c36775a4fb8.exe
Resource
win10v2004-20240226-en
General
-
Target
27032f1dd34ac61c7c01fee7ed966dddab2be93a2ea405277f4a3c36775a4fb8
-
Size
80KB
-
MD5
b916abdc2931255017db73009e146ae6
-
SHA1
abf1fdfa36e14b87e76acd9c5fbb6cbebbc79165
-
SHA256
27032f1dd34ac61c7c01fee7ed966dddab2be93a2ea405277f4a3c36775a4fb8
-
SHA512
dc636a27848ce8862279a30f9948a8d270a59e6b011080b27b84eea72ce09d7670a522ce1b39a9fc4cdc7ae6fa0a30d14ff324f9b7dfdf1d011b6007649328d7
-
SSDEEP
1536:BParBAcpGmgGO9FR6p+4922Ap8bfSpFskn6JIC57DPybf:BeBAvbh8p+49r8J6JIC57zybf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27032f1dd34ac61c7c01fee7ed966dddab2be93a2ea405277f4a3c36775a4fb8
Files
-
27032f1dd34ac61c7c01fee7ed966dddab2be93a2ea405277f4a3c36775a4fb8.exe windows:5 windows x86 arch:x86
09216f24a9b5f3af1a8a8421aacb9f24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
MultiByteToWideChar
GetLastError
GetProcAddress
GetLocalTime
LoadLibraryA
GetModuleFileNameA
CloseHandle
DeleteFileA
CreateFileW
GetStringTypeW
LCMapStringW
WriteConsoleW
HeapSize
Sleep
SetStdHandle
HeapReAlloc
LoadLibraryW
WriteFile
ExpandEnvironmentStringsA
GetTickCount
WaitForSingleObject
GetCurrentProcess
SetFilePointer
GetFileSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
FlushFileBuffers
CreateFileA
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetHandleCount
GetFileType
DeleteCriticalSection
RaiseException
user32
SetClipboardViewer
LoadCursorA
UpdateWindow
DispatchMessageA
ShowWindow
LoadAcceleratorsA
SendMessageTimeoutA
DefWindowProcA
ChangeClipboardChain
TranslateAcceleratorA
CreateWindowExA
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
LoadStringA
SendMessageA
TranslateMessage
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
ole32
CoCreateGuid
winhttp
WinHttpCloseHandle
WinHttpReadData
WinHttpReceiveResponse
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpOpenRequest
iphlpapi
GetAdaptersInfo
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ