E:\autobuild_cse_doctor_13\360csedoctor\ExtDoctor\Release\360bdoctor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ef1500722dfccc10f33bbdffaac2a224763e18ebfef78f8dca4ad5e0e70cc94b.exe
Resource
win7-20240221-en
General
-
Target
ef1500722dfccc10f33bbdffaac2a224763e18ebfef78f8dca4ad5e0e70cc94b
-
Size
2.6MB
-
MD5
73cfd2593f9fb652fad225295e11f1f1
-
SHA1
4f3129d48fc89c37c8aa076ab426b557460547a0
-
SHA256
ef1500722dfccc10f33bbdffaac2a224763e18ebfef78f8dca4ad5e0e70cc94b
-
SHA512
5f945bac22d0fe418b31f7ae7bc3a32566c354f4c2f93d1a7c9d16390549fcad1ff936934fa25b1b34f1d10a7af04cfd13b40dc20d47fbfebbd0d20054c2b09b
-
SSDEEP
49152:ttLLMkT6W3IXI9bCLcTnxzUoFdNA9+XhbefOMfp:rLLMkeW3cI9+YQihV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef1500722dfccc10f33bbdffaac2a224763e18ebfef78f8dca4ad5e0e70cc94b
Files
-
ef1500722dfccc10f33bbdffaac2a224763e18ebfef78f8dca4ad5e0e70cc94b.exe windows:5 windows x86 arch:x86
197d030a46feeae5c1bf8f652c1b0f05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateEventW
HeapAlloc
GetProcessHeap
HeapFree
GetExitCodeProcess
ExitProcess
CreateToolhelp32Snapshot
Process32FirstW
TerminateProcess
Process32NextW
ResumeThread
VirtualQuery
VirtualProtect
InterlockedCompareExchange
GetThreadContext
SetThreadContext
GetCurrentThread
SuspendThread
LoadLibraryA
GetFileAttributesExW
GetFileAttributesW
GetWindowsDirectoryW
TerminateThread
SetFileTime
SetFileAttributesW
FormatMessageW
LocalAlloc
GetLogicalDriveStringsA
GetVersion
GetSystemDirectoryA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetPrivateProfileStringW
GetModuleHandleA
GetSystemDefaultLangID
GetFileType
SystemTimeToFileTime
GetCurrentDirectoryW
DosDateTimeToFileTime
GetSystemDirectoryW
SetEvent
WaitForSingleObject
Sleep
ExpandEnvironmentStringsW
lstrcmpW
MulDiv
InterlockedIncrement
InterlockedDecrement
LoadLibraryExW
lstrcmpiW
FlushInstructionCache
GlobalUnlock
GlobalLock
GlobalAlloc
FreeResource
GetCurrentThreadId
GetSystemTime
GlobalMemoryStatusEx
CreateThread
OpenProcess
CreateMutexW
WideCharToMultiByte
MultiByteToWideChar
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetStartupInfoA
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
GetModuleFileNameA
GetStdHandle
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoW
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
DeleteAtom
FindAtomW
TlsAlloc
ReleaseMutex
AddAtomW
OpenThread
GetAtomNameW
TlsSetValue
TlsGetValue
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
lstrlenA
LocalFree
WritePrivateProfileStringW
GetCurrentProcess
GetVersionExW
RemoveDirectoryW
lstrcpyW
GetFullPathNameW
SetLastError
FindClose
FindNextFileW
FindFirstFileW
MoveFileExW
GetTickCount
GetTempPathW
OutputDebugStringW
WriteFile
CreateFileA
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
lstrlenW
InterlockedExchange
RaiseException
VirtualAlloc
ReadFile
CreateFileW
VirtualFree
SetFilePointer
GetFileSize
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
GetProcAddress
CreateProcessW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
GetCurrentProcessId
CloseHandle
FlushFileBuffers
IsProcessorFeaturePresent
HeapSize
HeapReAlloc
HeapDestroy
DeleteFileW
GetLastError
DeviceIoControl
CreateDirectoryW
user32
PtInRect
SetWindowPos
SetWindowLongW
GetWindowLongW
GetParent
GetWindowRect
GetWindow
SendMessageW
IsWindow
SetTimer
PostMessageW
PostQuitMessage
ShowWindow
CharUpperBuffW
GetShellWindow
GetWindowThreadProcessId
CallWindowProcW
GetDesktopWindow
GetSystemMetrics
GetMessageW
TranslateMessage
DispatchMessageW
SystemParametersInfoW
SetCursor
GetCursorPos
UpdateLayeredWindow
UpdateWindow
GetCapture
TrackMouseEvent
AdjustWindowRectEx
DrawTextW
InflateRect
DrawIconEx
GetIconInfo
WindowFromDC
UnregisterClassA
RegisterClassExW
GetClassInfoExW
LoadCursorW
DefWindowProcW
DestroyWindow
GetDlgItem
CreateWindowExW
MapWindowPoints
ExitWindowsEx
MessageBoxW
GetForegroundWindow
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
FindWindowExW
LoadStringW
DialogBoxParamW
ReplyMessage
InSendMessageEx
LoadIconW
GetActiveWindow
SetWindowRgn
IsIconic
PeekMessageW
SetForegroundWindow
FindWindowW
GetKeyState
KillTimer
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
BeginPaint
EndPaint
IsChild
GetFocus
SetFocus
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
ClientToScreen
ScreenToClient
MoveWindow
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
InvalidateRect
GetDC
ReleaseDC
DestroyAcceleratorTable
CharNextW
EndDialog
MonitorFromWindow
GetMonitorInfoW
GetClientRect
gdi32
GetLayout
CreateRoundRectRgn
CreateSolidBrush
CreateCompatibleBitmap
BitBlt
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
DeleteObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
SetViewportOrgEx
GetObjectType
GetRandomRgn
GdiAlphaBlend
RectVisible
SetLayout
GetCurrentObject
SetBkMode
LPtoDP
SetGraphicsMode
SetWorldTransform
ModifyWorldTransform
GetTextExtentPoint32W
CreateFontIndirectW
SelectClipRgn
CreateRectRgn
CombineRgn
OffsetRgn
GetRgnBox
CreateRectRgnIndirect
SaveDC
IntersectClipRect
RestoreDC
advapi32
GetTokenInformation
RegCloseKey
RegCreateKeyA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegSetKeySecurity
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
DuplicateTokenEx
RegQueryValueExW
SetNamedSecurityInfoW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExA
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHChangeNotify
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHFileOperationW
ole32
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoUninitialize
RegisterDragDrop
RevokeDragDrop
DoDragDrop
OleUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
CreateStdDispatch
CreateDispTypeInfo
VariantChangeType
VariantCopy
VarCmp
SysAllocStringLen
VariantInit
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VarUI4FromStr
SysStringLen
VarBstrCmp
SysFreeString
SysAllocString
VariantClear
shlwapi
StrCmpIW
StrStrIW
StrCmpNW
SHDeleteKeyW
StrToIntW
SHDeleteEmptyKeyW
SHStrDupW
SHGetValueA
SHSetValueA
SHDeleteValueW
PathFindExtensionW
StrStrW
PathIsRootW
SHSetValueW
SHGetValueW
PathAppendW
PathRemoveFileSpecW
PathFindFileNameW
PathFileExistsW
comctl32
InitCommonControlsEx
psapi
GetModuleFileNameExW
GetModuleInformation
GetProcessImageFileNameW
EnumProcessModules
wininet
HttpQueryInfoA
InternetCrackUrlW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpAddRequestHeadersA
InternetQueryOptionW
InternetSetOptionW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
InternetErrorDlg
InternetOpenUrlW
InternetOpenW
gdiplus
GdiplusShutdown
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Exports
Exports
get_addr
Sections
.text Size: 881KB - Virtual size: 880KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 45KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 139KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE