e:\广告相关\广告\私服劫持\SFHook\桌标\bin\release\DK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
94091e34d59f27a4141dfaf6c38ce47c840b922cb6da10047b9d84109da41065.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94091e34d59f27a4141dfaf6c38ce47c840b922cb6da10047b9d84109da41065.exe
Resource
win10v2004-20240802-en
General
-
Target
94091e34d59f27a4141dfaf6c38ce47c840b922cb6da10047b9d84109da41065
-
Size
512KB
-
MD5
451c2f6995f2a4f0e0a0fb20599014ec
-
SHA1
08ceb07688beafd689d58967c01855f9c309bef3
-
SHA256
94091e34d59f27a4141dfaf6c38ce47c840b922cb6da10047b9d84109da41065
-
SHA512
d7a5eff6984b4f140c84863535bd5eb2b898bdb99b387e172b088d09defeebb82d9cda3fe554e728d546dee14ae374fabad1650c596600d8f2af3bd2e6ed813c
-
SSDEEP
6144:vaMwNYR9UR7GsVqrf9ndiWX1zbjTC3FnKjs3tq3tAO/o:v1sFZVUndiW1TTxjsdWt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94091e34d59f27a4141dfaf6c38ce47c840b922cb6da10047b9d84109da41065
Files
-
94091e34d59f27a4141dfaf6c38ce47c840b922cb6da10047b9d84109da41065.exe windows:4 windows x86 arch:x86
877008e92a706fd7725e44ab28088f64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenProcess
WaitNamedPipeA
Process32NextW
FindNextFileA
EnterCriticalSection
GetCurrentProcessId
OpenEventA
ReadFile
FindFirstFileA
GetCurrentThreadId
OutputDebugStringA
GetLastError
OpenFileMappingA
CreateMutexA
MapViewOfFile
UnmapViewOfFile
FindClose
LocalFree
GetWindowsDirectoryA
LeaveCriticalSection
GetLocalTime
GetFileAttributesA
ResumeThread
SetEvent
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
GetLogicalDriveStringsA
GetModuleFileNameA
GetFileSize
GetProcessTimes
DeleteFileA
DuplicateHandle
SetFileAttributesA
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetTickCount
WaitForSingleObject
CreateEventA
Sleep
CreateToolhelp32Snapshot
SetEndOfFile
GetLocaleInfoW
IsValidLocale
InitializeCriticalSection
CreateFileMappingA
CopyFileA
OpenMutexA
OpenThread
SetUnhandledExceptionFilter
Process32FirstW
WriteFile
CloseHandle
DeviceIoControl
CreateDirectoryA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
GetStringTypeW
GetStringTypeA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
InterlockedExchange
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
ExitThread
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
RaiseException
HeapSize
GetConsoleCP
GetConsoleMode
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FlushFileBuffers
user32
GetClassNameA
GetWindowThreadProcessId
wsprintfA
GetMessageW
TranslateMessage
DispatchMessageW
SetWinEventHook
GetWindowTextA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
SetNamedSecurityInfoA
RegOpenKeyExA
RegEnumKeyExA
GetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
BuildExplicitAccessWithNameA
RegDeleteValueA
shell32
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
GetModuleFileNameExA
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
InternetQueryOptionA
InternetReadFile
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
InternetConnectA
Sections
.text Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ