E:\devops_yanfa\agent\workspace\p-e7b3c53a46f54196b0dc8829382a1ea8\src\wes-service\build\pdb\Release\ofx_check.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e3035482522aa9d8dd3b5f1c8f7890ab163862e9044e09664ab014b71d4cdb02.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
e3035482522aa9d8dd3b5f1c8f7890ab163862e9044e09664ab014b71d4cdb02.exe
Resource
win10v2004-20240508-en
General
-
Target
e3035482522aa9d8dd3b5f1c8f7890ab163862e9044e09664ab014b71d4cdb02
-
Size
1.2MB
-
MD5
7cc9f17b0e0d9d053dde0a4b8fc75c7f
-
SHA1
e62e5987e94c2c984f5b16fe719ecf9ab73f72a9
-
SHA256
e3035482522aa9d8dd3b5f1c8f7890ab163862e9044e09664ab014b71d4cdb02
-
SHA512
bd4927ec2f38e803564fe7cec597a047fe42781a0fb4def128cd8d30c465580a1ffb1d6e7a7e1f6d8908384005d3ab61bd9abca22d87529c9b744ecba923d5df
-
SSDEEP
12288:04+/x8J7ct3z5htUcQ1MlhrmQgwwJzt5+7fyZkCtXFiWZF/3o:04+mIJz5IcuMlQHJxrDiSi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3035482522aa9d8dd3b5f1c8f7890ab163862e9044e09664ab014b71d4cdb02
Files
-
e3035482522aa9d8dd3b5f1c8f7890ab163862e9044e09664ab014b71d4cdb02.exe windows:6 windows x64 arch:x64
e5c9c99703035591843a3dadeece452a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
service
WESServiceMrgUnInit
WESServiceMrgInit
WESServiceMrgAcqire
kernel32
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
SetErrorMode
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
IsDebuggerPresent
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140
_CxxThrowException
__std_terminate
_set_purecall_handler
__CxxFrameHandler3
__std_exception_copy
__C_specific_handler
memset
__RTDynamicCast
memcpy
__std_exception_destroy
memmove
api-ms-win-crt-runtime-l1-1-0
_get_initial_wide_environment
_initterm
_initterm_e
_exit
_cexit
__p___argc
__p___wargv
_initialize_wide_environment
_register_thread_local_exe_atexit_callback
_crt_atexit
terminate
_initialize_onexit_table
_set_invalid_parameter_handler
exit
_set_app_type
_c_exit
_seh_filter_exe
_invalid_parameter_noinfo_noreturn
_configure_wide_argv
_register_onexit_function
api-ms-win-crt-convert-l1-1-0
wcstombs
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
__p__commode
_set_fmode
__acrt_iob_func
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-heap-l1-1-0
free
_callnewh
_set_new_mode
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE