e:\广告相关\广告\私服劫持\SFHook\桌标\bin\release\DK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cce66c408a754df243152327a934d1636032a174fba81490b8ba8c8eaa3268ef.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cce66c408a754df243152327a934d1636032a174fba81490b8ba8c8eaa3268ef.exe
Resource
win10v2004-20240802-en
General
-
Target
cce66c408a754df243152327a934d1636032a174fba81490b8ba8c8eaa3268ef
-
Size
3.9MB
-
MD5
9f77f4741cc214e2fd0b8d1914fd85a8
-
SHA1
5ba78df7fa6caea726488c46c1f73f9f8f74210f
-
SHA256
cce66c408a754df243152327a934d1636032a174fba81490b8ba8c8eaa3268ef
-
SHA512
0f1316b32faccb2571e7c40098591433db7e68511ed8da380a1f90cf9d1139c12e1dd3d94ea8be9dff822de6115a6df86146863fe01d97243904fbf992341613
-
SSDEEP
49152:9KS91T1sdmKyf6FPInE5QZuTtS0rQMYOQ+q8CE4SW5wpYXG1ZW9KFeMF:9KS/T1swgFPLWsM0r1QnfSIG180FeI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cce66c408a754df243152327a934d1636032a174fba81490b8ba8c8eaa3268ef
Files
-
cce66c408a754df243152327a934d1636032a174fba81490b8ba8c8eaa3268ef.exe windows:4 windows x86 arch:x86
877008e92a706fd7725e44ab28088f64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenProcess
WaitNamedPipeA
Process32NextW
FindNextFileA
EnterCriticalSection
GetCurrentProcessId
OpenEventA
ReadFile
FindFirstFileA
GetCurrentThreadId
OutputDebugStringA
GetLastError
OpenFileMappingA
CreateMutexA
MapViewOfFile
UnmapViewOfFile
FindClose
LocalFree
GetWindowsDirectoryA
LeaveCriticalSection
GetLocalTime
GetFileAttributesA
ResumeThread
SetEvent
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
GetLogicalDriveStringsA
GetModuleFileNameA
GetFileSize
GetProcessTimes
DeleteFileA
DuplicateHandle
SetFileAttributesA
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetTickCount
WaitForSingleObject
CreateEventA
Sleep
CreateToolhelp32Snapshot
SetEndOfFile
GetLocaleInfoW
IsValidLocale
InitializeCriticalSection
CreateFileMappingA
CopyFileA
OpenMutexA
OpenThread
SetUnhandledExceptionFilter
Process32FirstW
WriteFile
CloseHandle
DeviceIoControl
CreateDirectoryA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
GetStringTypeW
GetStringTypeA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
InterlockedExchange
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
ExitThread
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
RaiseException
HeapSize
GetConsoleCP
GetConsoleMode
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FlushFileBuffers
user32
GetClassNameA
GetWindowThreadProcessId
wsprintfA
GetMessageW
TranslateMessage
DispatchMessageW
SetWinEventHook
GetWindowTextA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
SetNamedSecurityInfoA
RegOpenKeyExA
RegEnumKeyExA
GetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
BuildExplicitAccessWithNameA
RegDeleteValueA
shell32
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
GetModuleFileNameExA
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
InternetQueryOptionA
InternetReadFile
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
InternetConnectA
Sections
.text Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ