C:\Users\userPD\Desktop\이걸로성공한다\스타트 - 복사본\Debug\20160729_winApi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c2796d4c2055505a1bbbdf55f4042c564c0386a338f355556bd8c1973d00977c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2796d4c2055505a1bbbdf55f4042c564c0386a338f355556bd8c1973d00977c.exe
Resource
win10v2004-20240226-en
General
-
Target
c2796d4c2055505a1bbbdf55f4042c564c0386a338f355556bd8c1973d00977c
-
Size
71KB
-
MD5
1f26dcad1967ae9f7ed38f113d206da8
-
SHA1
679e08185842505dc4aadfcc370db60b51a9ead7
-
SHA256
c2796d4c2055505a1bbbdf55f4042c564c0386a338f355556bd8c1973d00977c
-
SHA512
595a50c015213c16e716fa1d3515d497f6bfd0a2199e59863677dee63e73bd12ec5b9eab3cbc40cf5ec09b1cea75fd4c6d15bc12c51efa3d35b9f0f6a1ed4d30
-
SSDEEP
768:4cNr2AzpVvW7Z+GRxlef4enCwjeXdxpvYsYpBcTsLuTHOnkn:bzpVW7X8vlKXdxpQsYpyTsL5kn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2796d4c2055505a1bbbdf55f4042c564c0386a338f355556bd8c1973d00977c
Files
-
c2796d4c2055505a1bbbdf55f4042c564c0386a338f355556bd8c1973d00977c.exe windows:6 windows x86 arch:x86
ce0b00ebd8f4728a0a9bba2fd7bedbca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryExW
GetProcAddress
GetLastError
RaiseException
IsDebuggerPresent
DecodePointer
EncodePointer
GetModuleHandleW
IsProcessorFeaturePresent
GetTickCount
user32
LoadIconA
LoadCursorA
AdjustWindowRect
SetWindowPos
ShowWindow
CreateWindowExA
RegisterClassA
DispatchMessageA
TranslateMessage
GetMessageA
GetAsyncKeyState
GetKeyState
InvalidateRect
EndPaint
BeginPaint
KillTimer
SetTimer
PostQuitMessage
DefWindowProcA
PostMessageA
gdi32
Rectangle
GetStockObject
TextOutA
msvcp120d
?_Debug_message@std@@YAXPB_W0I@Z
?_Xout_of_range@std@@YAXPBD@Z
??0_Container_base12@std@@QAE@XZ
??1_Container_base12@std@@QAE@XZ
?_Orphan_all@_Container_base12@std@@QAEXXZ
?_Xbad_alloc@std@@YAXXZ
?_Xlength_error@std@@YAXPBD@Z
??0id@locale@std@@QAE@I@Z
?_Syserror_map@std@@YAPBDH@Z
?_Winerror_map@std@@YAPBDH@Z
msvcr120d
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
__CxxFrameHandler3
_purecall
memcpy
strlen
memmove
_hypot
_CxxThrowException
_CRT_RTC_INITW
??1type_info@@UAE@XZ
_lock
_unlock
_CrtDbgReportW
_wsplitpath_s
__dllonexit
_onexit
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__getmainargs
__set_app_type
_CrtSetCheckCount
exit
_exit
_cexit
_ismbblead
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
_acmdln
_fmode
_commode
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
?terminate@@YAXXZ
_except_handler4_common
__crtSetUnhandledExceptionFilter
_invoke_watson
_controlfp_s
wcscpy_s
_wmakepath_s
_calloc_dbg
vsprintf_s
rand
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ