e:\广告相关\广告\私服劫持\SFHook\桌标\bin\release\DK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bb302beaaf0fa3368f30257191fe0b463bb66d03b7dfe14d212255a673deac27.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb302beaaf0fa3368f30257191fe0b463bb66d03b7dfe14d212255a673deac27.exe
Resource
win10v2004-20240802-en
General
-
Target
bb302beaaf0fa3368f30257191fe0b463bb66d03b7dfe14d212255a673deac27
-
Size
941KB
-
MD5
e86166331d2ec3ecb16ab5e564e093c9
-
SHA1
3fcde68e2414243376e21c1db6c2e0c99a2ae66e
-
SHA256
bb302beaaf0fa3368f30257191fe0b463bb66d03b7dfe14d212255a673deac27
-
SHA512
1087e2ca5b2259e0334c9d830f8260304ee775e01cec08624961a8d7f0e7a75f4c336a49b88b8d134769c4ac4c2d5be1dcdd45869466b5b13736b61b1a7c767d
-
SSDEEP
12288:21sFZVUndiW1TTxjsdWtpMC9L/P4E2Kyb3sxE++PbzlLBeJVO:2KF4diW1TTxjsd1OPiKybjvy+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb302beaaf0fa3368f30257191fe0b463bb66d03b7dfe14d212255a673deac27
Files
-
bb302beaaf0fa3368f30257191fe0b463bb66d03b7dfe14d212255a673deac27.exe windows:4 windows x86 arch:x86
877008e92a706fd7725e44ab28088f64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenProcess
WaitNamedPipeA
Process32NextW
FindNextFileA
EnterCriticalSection
GetCurrentProcessId
OpenEventA
ReadFile
FindFirstFileA
GetCurrentThreadId
OutputDebugStringA
GetLastError
OpenFileMappingA
CreateMutexA
MapViewOfFile
UnmapViewOfFile
FindClose
LocalFree
GetWindowsDirectoryA
LeaveCriticalSection
GetLocalTime
GetFileAttributesA
ResumeThread
SetEvent
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
GetLogicalDriveStringsA
GetModuleFileNameA
GetFileSize
GetProcessTimes
DeleteFileA
DuplicateHandle
SetFileAttributesA
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetTickCount
WaitForSingleObject
CreateEventA
Sleep
CreateToolhelp32Snapshot
SetEndOfFile
GetLocaleInfoW
IsValidLocale
InitializeCriticalSection
CreateFileMappingA
CopyFileA
OpenMutexA
OpenThread
SetUnhandledExceptionFilter
Process32FirstW
WriteFile
CloseHandle
DeviceIoControl
CreateDirectoryA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
GetStringTypeW
GetStringTypeA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
InterlockedExchange
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
ExitThread
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
RaiseException
HeapSize
GetConsoleCP
GetConsoleMode
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FlushFileBuffers
user32
GetClassNameA
GetWindowThreadProcessId
wsprintfA
GetMessageW
TranslateMessage
DispatchMessageW
SetWinEventHook
GetWindowTextA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
SetNamedSecurityInfoA
RegOpenKeyExA
RegEnumKeyExA
GetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
BuildExplicitAccessWithNameA
RegDeleteValueA
shell32
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
GetModuleFileNameExA
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
InternetQueryOptionA
InternetReadFile
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
InternetConnectA
Sections
.text Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ