C:\Users\2495\Desktop\PESP\V652\fc2.0\ESP本体\vc12\Release\IJPLMENQ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e6e5e74ac8bf39a2839159a9ce75fbf65a01115588f160691a365ea7a84c84eb.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e6e5e74ac8bf39a2839159a9ce75fbf65a01115588f160691a365ea7a84c84eb.exe
Resource
win10v2004-20240802-en
General
-
Target
e6e5e74ac8bf39a2839159a9ce75fbf65a01115588f160691a365ea7a84c84eb
-
Size
554KB
-
MD5
cb6d0d9deafd3d8c3fa9026a518f3981
-
SHA1
fea43abd6631d9a07f8cde3b064f17047d3bfa1d
-
SHA256
e6e5e74ac8bf39a2839159a9ce75fbf65a01115588f160691a365ea7a84c84eb
-
SHA512
833a4262f6871203a1424440897537c7db5695b3d3b98b51a99c1fe63759662d6af00a9b6fd7eda93545d3b1e970f1666152dd5b5eec0b1e9810300ae28bb3a1
-
SSDEEP
6144:FFl3M43kbe186KeeAOuKmJ9HPnPlvVTaHl:FFC43ky+kKmnvnlVTAl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6e5e74ac8bf39a2839159a9ce75fbf65a01115588f160691a365ea7a84c84eb
Files
-
e6e5e74ac8bf39a2839159a9ce75fbf65a01115588f160691a365ea7a84c84eb.exe windows:6 windows x86 arch:x86
5b029983d0524e22ceaff40f7086b9ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLangID
GetPrivateProfileStringW
WritePrivateProfileStringW
lstrcmpW
GetModuleFileNameW
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
SetStdHandle
GetCurrentProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetProcAddress
GetModuleHandleW
GetLastError
CreateMutexW
CloseHandle
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
HeapFree
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapReAlloc
CreateFileW
user32
DialogBoxParamW
PostQuitMessage
GetWindowLongW
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
SetWindowLongW
CreateWindowExW
RegisterClassExW
LoadImageW
RegisterWindowMessageW
DefWindowProcW
SetFocus
FlashWindowEx
GetParent
GetSystemMetrics
SetWindowTextW
SendMessageW
SetDlgItemTextW
SendDlgItemMessageW
EndDialog
GetClientRect
ScreenToClient
ShowWindow
GetDlgItem
MoveWindow
GetWindowRect
LoadIconW
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
shlwapi
PathFileExistsW
PathIsDirectoryW
PathRemoveFileSpecW
PathAppendW
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 564B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ