D:\workspace\work\win\DingTalk-Win\win\symbol\Release\dingtalk_downloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aee9efee8c9bb89bf09f2484d7a30b0a20477ea0435474cc9840bb5b1157e2b7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aee9efee8c9bb89bf09f2484d7a30b0a20477ea0435474cc9840bb5b1157e2b7.exe
Resource
win10v2004-20240412-en
General
-
Target
aee9efee8c9bb89bf09f2484d7a30b0a20477ea0435474cc9840bb5b1157e2b7
-
Size
4.8MB
-
MD5
71539d0e55f0f97c6e3ba0d5593ec725
-
SHA1
850d40d559e7948a51c81143144117a4ac52779b
-
SHA256
aee9efee8c9bb89bf09f2484d7a30b0a20477ea0435474cc9840bb5b1157e2b7
-
SHA512
d45f462e12885bb71ddc779c3776ef9c385114bc1302566569983169ade5e636af7fe4cc1b03a033f537aad8d6d547de27ab5207030df07ad4ac9c5f94ce494e
-
SSDEEP
98304:Mvib9gRIoSykPcKS+2KVJj0mbggp3B/H8d:Qib9N9vVJj0m3x/H8d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aee9efee8c9bb89bf09f2484d7a30b0a20477ea0435474cc9840bb5b1157e2b7
Files
-
aee9efee8c9bb89bf09f2484d7a30b0a20477ea0435474cc9840bb5b1157e2b7.exe windows:5 windows x86 arch:x86
0daabf4d5ffc8e065643210cbc9eee8c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
GetVersionExW
GetCurrentThreadId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetUserDefaultUILanguage
FlushInstructionCache
GetCurrentProcess
WaitForSingleObject
CreateEventA
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetProcAddress
SetLastError
lstrcmpiW
CreateMutexW
LoadLibraryExW
GetModuleHandleW
GetCommandLineW
GlobalAlloc
GlobalLock
GlobalUnlock
GetStdHandle
GetFileType
WriteFile
GetModuleHandleA
TlsGetValue
WaitForSingleObjectEx
SetEvent
InterlockedExchange
InterlockedExchangeAdd
PostQueuedCompletionStatus
TlsAlloc
TlsFree
Sleep
VerSetConditionMask
SleepEx
VerifyVersionInfoA
LoadLibraryW
LocalFree
FormatMessageA
OpenEventA
WaitForMultipleObjects
PeekNamedPipe
LoadLibraryA
ExpandEnvironmentStringsA
ReleaseSemaphore
DuplicateHandle
CreateSemaphoreA
GetSystemTimeAsFileTime
OutputDebugStringA
SetWaitableTimer
GetQueuedCompletionStatus
InterlockedCompareExchange
TlsSetValue
TerminateThread
VerifyVersionInfoW
OpenMutexW
QueueUserAPC
CreateEventW
CreateIoCompletionPort
CreateWaitableTimerW
ReleaseMutex
ResetEvent
WaitForMultipleObjectsEx
ResumeThread
GetSystemInfo
GetLogicalProcessorInformation
CreateWaitableTimerA
GetTickCount
MoveFileExW
Process32FirstW
GlobalMemoryStatusEx
Module32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
RemoveDirectoryW
SetEndOfFile
SetFilePointerEx
SetFileTime
DeviceIoControl
GetWindowsDirectoryW
CreateDirectoryExW
GetTempPathW
InitializeCriticalSectionAndSpinCount
CreateFileA
GetFileSize
HeapCompact
SetFilePointer
TryEnterCriticalSection
MapViewOfFile
UnmapViewOfFile
QueryPerformanceCounter
UnlockFile
FlushViewOfFile
LockFile
OutputDebugStringW
UnlockFileEx
GetFileAttributesA
HeapCreate
HeapValidate
FlushFileBuffers
LockFileEx
GetDiskFreeSpaceW
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
GetVersionExA
GetTempPathA
GetSystemTime
AreFileApisANSI
DeleteFileA
FindFirstFileA
FindNextFileA
GlobalMemoryStatus
SetInformationJobObject
FreeResource
GetDriveTypeW
AllocConsole
CreateJobObjectW
GetLogicalDrives
GetSystemDirectoryW
AssignProcessToJobObject
FreeConsole
FileTimeToSystemTime
GetACP
SetConsoleCtrlHandler
SetConsoleOutputCP
SetConsoleTitleW
FileTimeToLocalFileTime
FlushConsoleInputBuffer
GetModuleFileNameW
SystemTimeToFileTime
DeleteCriticalSection
IsDebuggerPresent
lstrlenW
lstrlenA
SetEnvironmentVariableA
WriteConsoleW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
SetProcessAffinityMask
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
ReadConsoleW
GetConsoleCP
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
CompareStringW
GetTimeFormatW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
InitializeSListHead
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
RtlCaptureStackBackTrace
CreateTimerQueue
CreateSemaphoreW
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FatalAppExitA
SetConsoleMode
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetConsoleMode
SetEnvironmentVariableW
RaiseException
DecodePointer
GetDateFormatW
CopyFileW
GetFullPathNameA
CreateDirectoryW
FormatMessageW
GetLocalTime
GetCurrentProcessId
GlobalFree
CreateFileW
CloseHandle
ReadFile
WideCharToMultiByte
MultiByteToWideChar
FindResourceExW
FindResourceW
SizeofResource
LoadResource
GetLastError
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LCMapStringW
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
ExitThread
CreateThread
GetTimeZoneInformation
GetModuleHandleExW
ExitProcess
GetCPInfo
RtlUnwind
EncodePointer
GetExitCodeThread
GetCurrentThread
GetStringTypeW
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
LockResource
user32
KillTimer
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
DefWindowProcW
DestroyWindow
ShowWindow
CreateDialogParamW
CharNextW
SetWindowLongW
SetWindowPos
EndDialog
GetClientRect
GetWindowRect
MapWindowPoints
GetWindowLongW
SetTimer
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetDlgItem
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
SetWindowTextW
SendMessageW
AttachThreadInput
MoveWindow
IsIconic
BringWindowToTop
DialogBoxParamW
GetActiveWindow
EnableWindow
GetSystemMetrics
SetActiveWindow
GetForegroundWindow
SetForegroundWindow
GetWindowThreadProcessId
LoadImageW
PostMessageW
wsprintfW
ReleaseDC
RegisterWindowMessageW
UnregisterClassW
GetParent
IsDialogMessageW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
ExitWindowsEx
GetDC
PostQuitMessage
gdi32
GetDIBits
GetDeviceCaps
DeleteObject
CreateCompatibleBitmap
GetObjectA
advapi32
RegQueryValueExW
CreateWellKnownSid
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
shell32
ord43
SHGetSpecialFolderPathW
ord680
ord165
ShellExecuteExW
SHGetFolderPathW
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemRealloc
oleaut32
SysAllocString
VariantClear
SysFreeString
CreateErrorInfo
GetErrorInfo
VariantInit
VariantChangeType
SetErrorInfo
VarUI4FromStr
shlwapi
PathMatchSpecW
PathAppendW
PathCombineW
PathFileExistsW
comctl32
InitCommonControlsEx
winhttp
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpCloseHandle
WinHttpOpen
WinHttpCrackUrl
psapi
GetProcessMemoryInfo
iphlpapi
GetAdaptersInfo
wininet
InternetTimeToSystemTimeA
InternetOpenW
HttpQueryInfoA
InternetTimeFromSystemTimeA
InternetReadFile
InternetConnectW
HttpSendRequestW
InternetSetOptionW
HttpQueryInfoW
InternetSetCookieA
InternetSetFilePointer
InternetCloseHandle
HttpOpenRequestW
ws2_32
ioctlsocket
listen
accept
sendto
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
htonl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAGetLastError
WSACleanup
WSAStartup
ntohl
gethostname
shutdown
socket
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
Sections
.text Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 651KB - Virtual size: 651KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 560KB - Virtual size: 560KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ