d:\PMS\pms4\Project(20131120)\HanAgent\bin\HanAgent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
19cf38f9c7a87daf182f3cc3db1428e8f8e88cc29cf55e3b92fc032db43e0118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19cf38f9c7a87daf182f3cc3db1428e8f8e88cc29cf55e3b92fc032db43e0118.exe
Resource
win10v2004-20240508-en
General
-
Target
19cf38f9c7a87daf182f3cc3db1428e8f8e88cc29cf55e3b92fc032db43e0118
-
Size
416KB
-
MD5
aa252e73644fd80f6af3fe15633299ab
-
SHA1
255d0ccff768806af87fa85e4c01e1183f6a63f5
-
SHA256
19cf38f9c7a87daf182f3cc3db1428e8f8e88cc29cf55e3b92fc032db43e0118
-
SHA512
c5e5bfe1d1e779dd7a0260d2b7f856012c2c432601b31b1ffeeb33b718591b48e3b42716947315b8f1b77e773614a66b3bf16b51e85f95dbc097235301fb6c51
-
SSDEEP
6144:guppFOoc36wKdtf1Ik8OTxM1HXiLzNUFV5gZFBdw6lqk+opb4lbIW1oedj6apw:gIFOocqPaUNM13iXNUKS1cobIWWZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19cf38f9c7a87daf182f3cc3db1428e8f8e88cc29cf55e3b92fc032db43e0118
Files
-
19cf38f9c7a87daf182f3cc3db1428e8f8e88cc29cf55e3b92fc032db43e0118.exe windows:5 windows x86 arch:x86
4956fd400ae6e9f3a34d7f9c01b0d2c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
Process32FirstW
Process32NextW
CloseHandle
OpenProcess
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
GetCurrentThreadId
WideCharToMultiByte
GetVersionExW
GetModuleHandleW
GetCurrentProcess
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
CreateDirectoryW
WriteFile
SetFileTime
CreateToolhelp32Snapshot
CreateFileA
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
QueryPerformanceCounter
CreateEventW
DeleteFileW
GetModuleFileNameW
GetSystemDirectoryW
GetTempPathW
GetCurrentProcessId
GetFileAttributesW
GetTickCount
Sleep
LoadLibraryW
CreateThread
GetProcAddress
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
RaiseException
GetStartupInfoA
GetFileType
SetHandleCount
HeapSize
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
HeapAlloc
HeapFree
GetStartupInfoW
RtlUnwind
HeapReAlloc
ExitProcess
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
VirtualFree
VirtualAlloc
HeapCreate
GetStdHandle
GetModuleFileNameA
GetConsoleCP
GetConsoleMode
TlsGetValue
TlsAlloc
TlsSetValue
user32
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
GetMessageW
LoadCursorW
RegisterClassExW
CreateWindowExW
DefWindowProcW
LoadAcceleratorsW
LoadIconW
wsprintfW
GetSystemMetrics
GetWindowDC
PrintWindow
SetCursorPos
SendInput
GetWindowTextW
WindowFromPoint
GetWindowRect
FindWindowW
PostQuitMessage
EndPaint
BeginPaint
gdi32
DeleteDC
GetDIBits
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
BitBlt
DeleteObject
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
shell32
ShellExecuteW
ws2_32
WSAStartup
socket
gethostbyname
inet_addr
gethostbyaddr
htons
connect
closesocket
send
recv
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ