f:\软件工程\驱动编程\OK\Kernel_0714\bin\Start.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a93e67f83cf8bc465910a654289188f48178d49be764136d20f4670c079fdcd3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a93e67f83cf8bc465910a654289188f48178d49be764136d20f4670c079fdcd3.exe
Resource
win10v2004-20240419-en
General
-
Target
a93e67f83cf8bc465910a654289188f48178d49be764136d20f4670c079fdcd3
-
Size
226KB
-
MD5
11f2af31b65b4743641b9dabd18e83be
-
SHA1
88f5c37bec40f237d8e2d4bb3ae32905a762ba14
-
SHA256
a93e67f83cf8bc465910a654289188f48178d49be764136d20f4670c079fdcd3
-
SHA512
5de19cc94af2d854731c8cff4118c9764a52365db1d751660688902e53382400867ebc4148be74fb91547681121042192dcbe26634f8a89a964a6b082068e159
-
SSDEEP
3072:DGSyY4L+c2JhX7ypa3rV3dZPFvOAngoRUAFa1nxayHdXkb5kA7:iXY4LK+a3lLNngoqRttA7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a93e67f83cf8bc465910a654289188f48178d49be764136d20f4670c079fdcd3
Files
-
a93e67f83cf8bc465910a654289188f48178d49be764136d20f4670c079fdcd3.exe windows:5 windows x86 arch:x86
9ad1401372763c4735cde7c348d8b946
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
Sleep
GetModuleFileNameW
GetFileSize
ReadFile
WinExec
UnmapViewOfFile
DeleteFileW
ExitProcess
CreateProcessW
WaitForSingleObject
GetCurrentProcess
GetVersionExW
MapViewOfFile
CreateFileMappingW
WriteFile
CreateFileW
CloseHandle
GetLastError
MultiByteToWideChar
LoadLibraryW
CreateFileA
GetProcAddress
HeapSize
HeapAlloc
HeapFree
GetFileAttributesA
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
CreateDirectoryA
advapi32
OpenProcessToken
RegSetValueExW
RegCreateKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
CloseServiceHandle
StartServiceW
OpenServiceW
CreateServiceW
OpenSCManagerW
ChangeServiceConfigW
imagehlp
CheckSumMappedFile
netapi32
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 149KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ