f:\Cx\Vc++\自己\Dmpt\Dm_客户接口_一般\淘宝扫号_v5\启动界面\Release\启动界面.pdb
Static task
static1
Behavioral task
behavioral1
Sample
86ca997c1468557344fa89a76c6867c52e9ed46de6caed88ca9223b7af61a83c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
86ca997c1468557344fa89a76c6867c52e9ed46de6caed88ca9223b7af61a83c.exe
Resource
win10v2004-20240611-en
General
-
Target
86ca997c1468557344fa89a76c6867c52e9ed46de6caed88ca9223b7af61a83c
-
Size
392KB
-
MD5
34afcfba5cb9b023bab2a55b1b9951e2
-
SHA1
a028aca8884cacde72773bdbbfbe7d9dfdea8d17
-
SHA256
86ca997c1468557344fa89a76c6867c52e9ed46de6caed88ca9223b7af61a83c
-
SHA512
2d5e34a525a33e27e379518ae453e46a91d9463d59f81f6c32b9805b079ff0f29080f91b50846472c231ce27b6914fb7c3d38d1b30ce1e3a8d7a55eaa30d8aa9
-
SSDEEP
12288:qcvdltdcSPyiZIaAbFVFkEPtqthOoaFuquhsE0R:qKFlPyiZKFAHOEK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86ca997c1468557344fa89a76c6867c52e9ed46de6caed88ca9223b7af61a83c
Files
-
86ca997c1468557344fa89a76c6867c52e9ed46de6caed88ca9223b7af61a83c.exe windows:4 windows x86 arch:x86
2fe8da426cf940b490c94dfaaa0325fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetOEMCP
SetErrorMode
HeapAlloc
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetCurrentProcessId
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetCPInfo
GlobalFlags
GetProcessHeap
CloseHandle
Module32Next
Module32First
Process32First
CreateToolhelp32Snapshot
CreateProcessA
CopyFileA
Sleep
GetCommandLineA
DeleteFileA
GetTempPathA
WriteFile
CreateFileA
GetModuleFileNameA
GetTickCount
VirtualProtect
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
GetVersion
lstrcmpiA
lstrlenA
CompareStringA
CompareStringW
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
OpenProcess
GetPrivateProfileIntA
GetPrivateProfileStringA
CreateThread
LocalFree
lstrcpynA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
FileTimeToSystemTime
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
WritePrivateProfileStringA
InterlockedDecrement
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcatA
lstrcmpW
lstrcmpA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
FreeLibrary
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
Process32Next
user32
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
DestroyMenu
LoadCursorA
GetSysColorBrush
MapDialogRect
wsprintfA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
CharNextA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
MessageBoxA
EnableWindow
CharUpperA
SendMessageA
GetWindow
DrawIcon
IsIconic
GetWindowRect
GetClientRect
IsWindow
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
GetKeyState
SetForegroundWindow
GetMenu
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
GetClassInfoA
RegisterClassA
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
MapWindowPoints
UpdateWindow
IsWindowVisible
RedrawWindow
SetTimer
KillTimer
GetParent
LoadIconA
GetSystemMetrics
FindWindowExA
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
DispatchMessageA
PeekMessageA
PostMessageA
UnregisterClassA
PtInRect
CopyRect
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
SetWindowContextHelpId
gdi32
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreateRectRgnIndirect
GetRgnBox
GetMapMode
SetMapMode
RestoreDC
SaveDC
GetTextColor
GetBkColor
GetStockObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateFontIndirectA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
DragQueryFileA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
OleFlushClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleIsCurrentClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
SystemTimeToVariantTime
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
VariantCopy
SafeArrayDestroy
ws2_32
inet_addr
ntohl
WSACleanup
htons
socket
closesocket
send
recv
ioctlsocket
connect
select
gethostbyname
WSAStartup
shutdown
gdiplus
GdiplusShutdown
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ