G:\杂代码\aaaa\appclient\Debug\appclient.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e79b5f909411b01f074e7bcee43c62f17c8bcdfcd7ee4b9af8cdcc6461e1247c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e79b5f909411b01f074e7bcee43c62f17c8bcdfcd7ee4b9af8cdcc6461e1247c.exe
Resource
win10v2004-20240412-en
General
-
Target
e79b5f909411b01f074e7bcee43c62f17c8bcdfcd7ee4b9af8cdcc6461e1247c
-
Size
43KB
-
MD5
96ee286029c29695cb00bd9e18e19e13
-
SHA1
1f673f8c1be6644d337c0aba7ade4a6a866f27af
-
SHA256
e79b5f909411b01f074e7bcee43c62f17c8bcdfcd7ee4b9af8cdcc6461e1247c
-
SHA512
18b027b50ffce0d1481d4d4a3ecaf1de8ecc48a9f93d0ba37824b05624f123d0dc11969bec606d57245f999a2d580541bc140bb2dfa52f4770a21424c93f1844
-
SSDEEP
384:y7//e+C8r4RZY31y0W/O/M+O7ayRAp8oR5PuwUb2qY9O1OJPVopidl:yq8r4jqAOhp8mlUDYg1OJdopSl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e79b5f909411b01f074e7bcee43c62f17c8bcdfcd7ee4b9af8cdcc6461e1247c
Files
-
e79b5f909411b01f074e7bcee43c62f17c8bcdfcd7ee4b9af8cdcc6461e1247c.exe windows:5 windows x86 arch:x86
48b2a6ca33cd99466e386724a1426aeb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc100ud
ord1428
ord991
ord2479
ord1442
msvcr100d
_initterm_e
_initterm
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_crt_debugger_hook
_CrtDbgReportW
_CrtSetCheckCount
__winitenv
exit
_cexit
_XcptFilter
_exit
__wgetmainargs
_amsg_exit
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_onexit
_lock
__dllonexit
_unlock
_CRT_RTC_INITW
??_V@YAXPAX@Z
sprintf
gets
strlen
wprintf
printf
_beginthreadex
?terminate@@YAXXZ
kernel32
GetModuleHandleW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
LoadLibraryW
GetProcAddress
lstrlenA
RaiseException
MultiByteToWideChar
IsDebuggerPresent
WideCharToMultiByte
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
FreeLibrary
GetCommandLineW
CloseHandle
VirtualQuery
oleaut32
SysFreeString
ws2_32
inet_ntoa
recvfrom
sendto
WSAStartup
closesocket
listen
htons
inet_addr
socket
WSACleanup
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ