E:\dome\VS2022\LostKR\LostKr\x64\Release\LostKr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
diaoyu.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
diaoyu.dll
Resource
win10v2004-20240611-en
General
-
Target
diaoyu.dll.exe
-
Size
76KB
-
MD5
58756f1c3fbac3f9a951ca8ca42e84f4
-
SHA1
57f6ea4fc934b743279eeacd08ccf0220a776be3
-
SHA256
68be640f730963cae039a3877d462931e6e92a4e03797788d08589b8bae4f43e
-
SHA512
50372108dc734d5cea39ebfbc4da835228cfffe55fa3c47a5d2fec401d97f41100f8738f628b1a0a39d5759b68a40b5fa328718d7e9d33b155eec85bb443fe31
-
SSDEEP
1536:YQsKBoWXIjODh+16vprFrjCkIgnu6qQRX+NHScdtqfrRTe:YQ7oWXfDzvprlW56rRX+9ScdtANe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource diaoyu.dll.exe
Files
-
diaoyu.dll.exe.dll windows:6 windows x64 arch:x64
ebab41e756341412add1c0b62396dc83
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualQuery
Sleep
IsBadReadPtr
GetCurrentProcessId
FreeLibraryAndExitThread
RtlAddFunctionTable
CreateFileMappingA
MapViewOfFile
CloseHandle
UnmapViewOfFile
CreateEventA
SetEvent
WaitForSingleObject
ResetEvent
CreateThread
OutputDebugStringA
GetModuleHandleA
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
RtlCaptureContext
GetSystemTimeAsFileTime
InitializeSListHead
GetModuleFileNameA
user32
RegisterWindowMessageA
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
SendMessageA
PostMessageA
SetForegroundWindow
SendMessageTimeoutA
FindWindowExA
GetWindowTextA
IsWindowVisible
advapi32
RegSetValueExA
msvcp140
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140
__std_type_info_destroy_list
memset
_CxxThrowException
strstr
wcsstr
__std_exception_destroy
__std_exception_copy
memmove
__C_specific_handler
memcpy
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_seh_filter_dll
_initterm
_crt_atexit
_configure_narrow_argv
_initialize_narrow_environment
_execute_onexit_table
_register_onexit_function
_invalid_parameter_noinfo_noreturn
_cexit
_invalid_parameter_noinfo
_errno
_initialize_onexit_table
api-ms-win-crt-string-l1-1-0
strcat_s
_stricmp
wcscpy_s
strcpy_s
api-ms-win-crt-math-l1-1-0
sqrt
round
pow
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf_s
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
Exports
Exports
VMProtectSDK32
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ