D:\zuhao\ggzuhao_Unicode\Output\ZhLauncher\ZhLauncher.pdb
Behavioral task
behavioral1
Sample
3c9ced26d0da27b358b13321c458ed12532f0b48c4e541b51bc733116726ac43.exe
Resource
win7-20240221-en
General
-
Target
3c9ced26d0da27b358b13321c458ed12532f0b48c4e541b51bc733116726ac43
-
Size
2.4MB
-
MD5
8f982f8eb96541ee0ab3ebfa4f124dd2
-
SHA1
b4eece013eeea7f453016ee9add9a1d8ae6ef1a9
-
SHA256
3c9ced26d0da27b358b13321c458ed12532f0b48c4e541b51bc733116726ac43
-
SHA512
21d25f152268be823d21c3031e90d26bec9a5287697f6110e470e22a83a4a56d4459eb7d7843f5b3b88871d1522c8dc2d557747e9ce0ef703031a9c88e0f6025
-
SSDEEP
49152:d7PTF2VY3cJgk4lRsocD8mbaTI+LSsjDilurcPPiUJ7NrPTlcPUv20jvP5sRSm:d752G3n3socD8m+LjPilurcPPig7Nrxk
Malware Config
Signatures
-
resource yara_rule sample detect_ak_stuff -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c9ced26d0da27b358b13321c458ed12532f0b48c4e541b51bc733116726ac43
Files
-
3c9ced26d0da27b358b13321c458ed12532f0b48c4e541b51bc733116726ac43.exe windows:6 windows x86 arch:x86
7459494c3b438624aae27a22a85e0a0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
DeleteFileW
LoadLibraryW
FileTimeToSystemTime
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateThread
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
SetUnhandledExceptionFilter
WriteFile
CreateEventW
SetEvent
GetCommandLineW
ResetEvent
GetProcAddress
GetVersionExW
GetCurrentProcess
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
ReadFile
GetOEMCP
GetPrivateProfileIntW
GetSystemTime
SystemTimeToFileTime
RemoveDirectoryA
GetCurrentDirectoryW
SetFileAttributesA
DeleteFileA
CreateFileW
FindClose
FindNextFileA
GetModuleFileNameW
FindFirstFileA
GetModuleFileNameA
CloseHandle
WaitForSingleObject
CreateMutexW
Wow64RevertWow64FsRedirection
IsValidCodePage
GetTimeZoneInformation
ReadConsoleInputW
SetConsoleMode
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FormatMessageA
Wow64DisableWow64FsRedirection
FreeLibrary
LoadLibraryA
Sleep
GetModuleHandleA
TerminateProcess
GetLastError
ReadConsoleW
GetConsoleMode
SetEnvironmentVariableW
ExitProcess
GetModuleHandleW
WideCharToMultiByte
GetProcessHeap
GetConsoleCP
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
MultiByteToWideChar
HeapSize
GetACP
SetConsoleCtrlHandler
ExitThread
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetDriveTypeW
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
VirtualAlloc
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
GetStartupInfoW
InitializeCriticalSectionEx
HeapFree
GetCommandLineA
IsDebuggerPresent
UnhandledExceptionFilter
SetLastError
SleepEx
VerSetConditionMask
QueryPerformanceFrequency
GetSystemDirectoryA
VerifyVersionInfoA
QueryPerformanceCounter
GetTickCount
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileSizeEx
GetStdHandle
FlushConsoleInputBuffer
GetFileType
GlobalMemoryStatus
FindFirstFileW
lstrlenW
SetFileTime
OutputDebugStringW
LoadLibraryExW
FormatMessageW
GetStringTypeW
TryEnterCriticalSection
DuplicateHandle
SwitchToThread
GetExitCodeThread
EncodePointer
IsProcessorFeaturePresent
QueueUserWorkItem
GetModuleHandleExW
CreateDirectoryW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
GetFullPathNameW
MoveFileExW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
user32
GetUserObjectInformationW
MessageBoxA
MessageBoxW
GetProcessWindowStation
advapi32
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
DeregisterEventSource
RegisterEventSourceA
ReportEventA
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashA
CryptEnumProvidersA
OpenThreadToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegDisableReflectionKey
RegEnableReflectionKey
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
OpenProcessToken
CryptGenRandom
CryptAcquireContextA
CryptReleaseContext
shell32
ShellExecuteW
crypt32
CertFindCertificateInStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertEnumCertificatesInStore
CertOpenStore
CertCloseStore
CryptQueryObject
CertFreeCertificateContext
version
GetFileVersionInfoSizeA
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoA
VerQueryValueA
iphlpapi
GetAdaptersInfo
shlwapi
PathFileExistsW
PathFileExistsA
PathRemoveFileSpecW
ws2_32
WSAGetLastError
socket
shutdown
gethostbyname
__WSAFDIsSet
select
WSASetLastError
recv
send
bind
closesocket
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSAIoctl
WSAStartup
WSACleanup
getaddrinfo
freeaddrinfo
ioctlsocket
sendto
htonl
inet_addr
listen
accept
recvfrom
getservbyname
urlmon
URLDownloadToFileA
wininet
DeleteUrlCacheEntryA
Exports
Exports
?CreateStringByParam@BLC_Net@@YA_NV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@00PAVHttpParamsI@1@AAV?$vector@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V?$allocator@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@2@@3@@Z
?CurlGetData@BLC_Net@@YA?AW4HTTPRETDATAENUM@1@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@0AAV34@1H0@Z
?CurlGetDataWithSign@BLC_Net@@YA?AW4HTTPRETDATAENUM@1@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@0AAV34@V?$vector@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V?$allocator@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@2@@4@1H0@Z
?CurlPostData@BLC_Net@@YA?AW4HTTPRETDATAENUM@1@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@0AAV34@1H0@Z
?CurlPostDataWithSign@BLC_Net@@YA?AW4HTTPRETDATAENUM@1@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@0AAV34@V?$vector@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V?$allocator@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@2@@4@1H0@Z
?NewDownloadFileForCurl@BLC_Net@@YAHV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@0AAKAAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@3@@Z
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 463KB - Virtual size: 462KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 55KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 146KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE