e:\Kouton\研发部\项目\2.ctbs 5.0\2.代码\Ctbs 6.0.2.0\CloudPlatform\CloudMission\Release\CloudMission.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3064c369cba245439abc0a0cfe2611f33391f4cffb140180a32eb3192c2b4867.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3064c369cba245439abc0a0cfe2611f33391f4cffb140180a32eb3192c2b4867.exe
Resource
win10v2004-20240802-en
General
-
Target
3064c369cba245439abc0a0cfe2611f33391f4cffb140180a32eb3192c2b4867
-
Size
108KB
-
MD5
3056e848b4f98394d19f9a5c7652fdbe
-
SHA1
0b50aad321a4f399b9936aa24f86d8add94d6753
-
SHA256
3064c369cba245439abc0a0cfe2611f33391f4cffb140180a32eb3192c2b4867
-
SHA512
09ed0ba64b4615def0376e2773aa03adda59975f212949021d2bdd1680542f2333afd235105dc145a6c273ed19237095a846fd6dac0985c74f958c43ded36018
-
SSDEEP
1536:fL0XIuglVUqsXl2VSgi/G/hFFoFKw1cL20t102tAZ4V8ogS9:fLCglp0f/G/qts5n0QAZ3ogA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3064c369cba245439abc0a0cfe2611f33391f4cffb140180a32eb3192c2b4867
Files
-
3064c369cba245439abc0a0cfe2611f33391f4cffb140180a32eb3192c2b4867.exe windows:4 windows x86 arch:x86
83a71c637476d78cfd9d951ad8fb1071
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc71
ord266
ord265
ord1084
ord3830
ord1054
ord566
ord757
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord1207
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord4541
ord764
msvcr71
__CxxFrameHandler
_controlfp
strrchr
strstr
_wtoi
_setmbcp
fseek
ftell
fclose
fputs
fopen
printf
_vsnprintf
free
_except_handler3
memset
__security_error_handler
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_adjust_fdiv
kernel32
GetPrivateProfileIntA
GetModuleFileNameA
GetCurrentProcess
CloseHandle
GetTickCount
GetLastError
SetLastError
SetEvent
WaitForSingleObject
ReleaseMutex
LeaveCriticalSection
DeleteFileA
SetFileAttributesA
GetFileAttributesA
FormatMessageA
CopyFileA
WideCharToMultiByte
GetACP
GetExitCodeProcess
GetCurrentThreadId
GetLocalTime
GetVersionExA
ExitProcess
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
TerminateProcess
OpenProcess
CreateProcessA
GetProcAddress
GetModuleHandleA
GetCommandLineW
InitializeCriticalSection
LocalFree
EnterCriticalSection
DeleteCriticalSection
user32
wsprintfA
advapi32
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatusEx
AdjustTokenPrivileges
StartServiceA
ControlService
OpenProcessToken
LookupPrivilegeValueA
shell32
CommandLineToArgvW
comctl32
ord17
msvcp71
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE