Static task
static1
Behavioral task
behavioral1
Sample
104f9c2b0d4f198aebc7b2ecc4045cef68a104f6129b0d9b70b8c51b57d0f07b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
104f9c2b0d4f198aebc7b2ecc4045cef68a104f6129b0d9b70b8c51b57d0f07b.exe
Resource
win10v2004-20240508-en
General
-
Target
104f9c2b0d4f198aebc7b2ecc4045cef68a104f6129b0d9b70b8c51b57d0f07b
-
Size
2.1MB
-
MD5
e9e522c470f4b2dc54de87b08006e8ba
-
SHA1
09b62ac76716f877544682a34cea3274719a3307
-
SHA256
104f9c2b0d4f198aebc7b2ecc4045cef68a104f6129b0d9b70b8c51b57d0f07b
-
SHA512
1a5e19c14f3a5e7c5e4b6ad5a2bfe8d6f0584a4c84dff893b0b2edcfd22680cbb02c095442c84c5ffbae44d5954fb74165823a3511e4b6a1170d08edb173a314
-
SSDEEP
49152:OdHV6h5WoSQf3PELignHOntgVz0oLJfJ84:G65WFQv85HUtQ0oVfn
Malware Config
Signatures
Files
-
104f9c2b0d4f198aebc7b2ecc4045cef68a104f6129b0d9b70b8c51b57d0f07b.exe windows:5 windows x86 arch:x86
c6fd1ba2147e82a6340518c7d739ac28
Code Sign
88:9f:65:32:3e:b6:d9:b1:5b:22:cf:dd:7f:8a:c1:cf:15:da:60:37Signer
Actual PE Digest88:9f:65:32:3e:b6:d9:b1:5b:22:cf:dd:7f:8a:c1:cf:15:da:60:37Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
E:\37WanWork\delphicode\vcLander\dts_version4\04代码\Bin\lander.pdb
Imports
kernel32
CreateDirectoryW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetTempPathW
WideCharToMultiByte
CreateEventW
CloseHandle
SetEvent
CreateFileW
WriteFile
Sleep
WaitForSingleObject
DeleteFileW
TerminateThread
GetTickCount
GetVersionExW
ReadFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetProcessAffinityMask
SetProcessAffinityMask
SetPriorityClass
DeviceIoControl
GetSystemInfo
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
CreateFileA
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeA
LoadLibraryExW
lstrcmpiW
GetLocaleInfoA
GetUserDefaultLCID
FlushFileBuffers
SetFilePointer
GetConsoleMode
GetConsoleCP
GetDateFormatA
GetTimeFormatA
IsValidCodePage
GetOEMCP
GetACP
GetTimeZoneInformation
GetStartupInfoA
GetFileType
SetHandleCount
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapCreate
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoW
CreateThread
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualQuery
VirtualProtect
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
IsValidLocale
MultiByteToWideChar
GlobalFree
GetModuleHandleW
GetProcAddress
FreeLibrary
GetCommandLineW
CreateProcessW
FindResourceExW
lstrcmpW
MulDiv
FlushInstructionCache
GetCurrentProcess
SetLastError
RaiseException
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenW
GetModuleFileNameW
IsBadWritePtr
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
GlobalUnlock
GlobalLock
GlobalAlloc
SizeofResource
LockResource
FreeResource
LoadResource
FindResourceW
InterlockedExchange
LeaveCriticalSection
EnumSystemLocalesA
user32
SendMessageW
SetWindowPos
SetWindowLongW
GetWindowLongW
UnregisterClassA
UpdateLayeredWindow
ReleaseDC
SystemParametersInfoW
GetClientRect
GetDC
LoadStringW
ShowWindow
ClientToScreen
ReleaseCapture
PostQuitMessage
DefWindowProcW
UpdateWindow
IsChild
MessageBoxW
LoadMenuW
GetSubMenu
RemoveMenu
DestroyMenu
CheckMenuItem
TrackPopupMenu
GetCursorPos
LoadIconW
CallWindowProcW
RegisterClassExW
LoadCursorW
DestroyAcceleratorTable
GetDesktopWindow
InvalidateRect
InvalidateRgn
FillRect
SetCapture
MoveWindow
ScreenToClient
GetParent
CreateAcceleratorTableW
DestroyWindow
CreateWindowExW
GetClassInfoExW
RedrawWindow
CharNextW
GetSysColor
GetClassNameW
IsWindow
GetDlgItem
GetWindow
LoadBitmapW
InflateRect
DrawTextW
SetCursor
PtInRect
IsWindowVisible
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
SetForegroundWindow
GetKeyState
PostMessageW
SetLayeredWindowAttributes
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
BeginPaint
EndPaint
GetFocus
SetFocus
gdi32
RestoreDC
SetTextColor
SetBkMode
SaveDC
CreateSolidBrush
BitBlt
GetStockObject
GetDeviceCaps
CreateCompatibleBitmap
GetObjectW
SetDIBColorTable
SelectObject
GetDIBColorTable
StretchBlt
DeleteObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
CreateFontW
advapi32
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyW
RegCloseKey
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
Shell_NotifyIconW
ole32
StringFromGUID2
OleLockRunning
CoCreateInstance
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleInitialize
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
CoCreateGuid
CoTaskMemAlloc
OleUninitialize
CreateStreamOnHGlobal
oleaut32
SysStringLen
VariantInit
SysAllocString
VariantClear
VarUI4FromStr
SysAllocStringLen
OleCreateFontIndirect
DispCallFunc
LoadTypeLi
LoadRegTypeLi
SysFreeString
shlwapi
PathFileExistsW
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
TransparentBlt
gdiplus
GdipGetImageHeight
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipAlloc
GdipGetImageWidth
GdipCloneImage
GdipDrawImageI
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdipFree
wininet
HttpOpenRequestW
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
FindFirstUrlCacheEntryW
InternetConnectW
InternetOpenW
InternetCrackUrlW
FindCloseUrlCache
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ