E:\软件代码\CTA8280\CTA8280_trunk\JCETUI\Release\CTA8280\JCETUI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
be8971cac348fabfc37424ae5bb8565c132aaaeb65aa68fb75237a06e811bd48.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be8971cac348fabfc37424ae5bb8565c132aaaeb65aa68fb75237a06e811bd48.exe
Resource
win10v2004-20240802-en
General
-
Target
be8971cac348fabfc37424ae5bb8565c132aaaeb65aa68fb75237a06e811bd48
-
Size
486KB
-
MD5
907a00a66a7775c1e887a80533805874
-
SHA1
d3bc423c0df64ab95bf91ca411bb601c6ee74430
-
SHA256
be8971cac348fabfc37424ae5bb8565c132aaaeb65aa68fb75237a06e811bd48
-
SHA512
4f8adda282bd0749894cad682da37c07ad9d96f60fdc8640402c2d68f816606c4b83cd1cfd572c84723ecce234047d1859bf01b40aee7d458f7b1c4faf1384b4
-
SSDEEP
12288:R2yt4TSX6jySDsRXd2zVfKO0seH4lc1vU:Rnt4mX6jySDsvO1KO/eOkU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be8971cac348fabfc37424ae5bb8565c132aaaeb65aa68fb75237a06e811bd48
Files
-
be8971cac348fabfc37424ae5bb8565c132aaaeb65aa68fb75237a06e811bd48.exe windows:5 windows x86 arch:x86
fe0c004ae4e9c7de5baef9fc8e5d8d1b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
mfc100u
ord5883
ord1014
ord6727
ord13133
ord4356
ord6246
ord7973
ord12413
ord7929
ord6243
ord4959
ord261
ord1440
ord13214
ord13220
ord1477
ord4512
ord9447
ord6869
ord890
ord1292
ord7176
ord1895
ord849
ord12753
ord2068
ord7619
ord1266
ord5219
ord6140
ord9328
ord5118
ord11845
ord11240
ord9498
ord7391
ord4086
ord11236
ord11228
ord5261
ord3416
ord13568
ord13571
ord13569
ord13572
ord13567
ord13570
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord7548
ord7624
ord7618
ord3763
ord2844
ord8273
ord6117
ord1905
ord1934
ord788
ord1212
ord10081
ord13412
ord11940
ord5830
ord306
ord8270
ord3752
ord6870
ord970
ord5846
ord13047
ord3260
ord3368
ord917
ord897
ord5802
ord8346
ord5468
ord8393
ord11210
ord8264
ord2418
ord12610
ord5558
ord2746
ord3746
ord11682
ord3397
ord4360
ord3978
ord2542
ord11374
ord5238
ord5664
ord10969
ord1269
ord868
ord1313
ord290
ord11494
ord2529
ord4956
ord7353
ord4216
ord4511
ord3380
ord4514
ord11495
ord316
ord310
ord903
ord1319
ord1486
ord4478
ord11683
ord4150
ord4151
ord11801
ord7876
ord13208
ord11838
ord7524
ord293
ord11123
ord10412
ord3627
ord2981
ord2980
ord2756
ord5556
ord12606
ord2887
ord2884
ord7385
ord2417
ord14146
ord14148
ord14147
ord14145
ord14149
ord14132
ord14059
ord14060
ord8277
ord11081
ord3402
ord10937
ord13380
ord8112
ord6247
ord10045
ord8372
ord2853
ord12724
ord11246
ord11244
ord1501
ord1508
ord1514
ord1512
ord1519
ord4388
ord4425
ord4396
ord4408
ord4404
ord4400
ord4430
ord4421
ord4392
ord4434
ord4413
ord4379
ord4383
ord4416
ord3999
ord14067
ord3992
ord2665
ord13382
ord7109
ord13388
ord6156
ord10725
ord12557
ord5276
ord2339
ord11116
ord3491
ord2952
ord2951
ord2852
ord11159
ord4642
ord4923
ord5115
ord8483
ord4901
ord5143
ord4645
ord4794
ord4623
ord6931
ord6932
ord6922
ord4792
ord7393
ord9333
ord8347
ord6036
ord13396
ord11330
ord2057
ord11353
ord13415
ord11164
ord12951
ord7006
ord8179
ord5198
ord1476
ord1479
ord285
ord5264
ord2629
ord10058
ord13305
ord280
ord12512
ord2614
ord7246
ord7241
ord2062
ord1312
ord286
ord4197
ord981
ord423
ord1310
ord4805
ord3174
ord5855
ord4359
ord9525
ord6713
ord3261
ord950
ord5801
ord5862
ord3446
ord4290
ord1987
ord948
ord902
ord2064
ord296
ord385
ord6346
ord266
ord265
ord1298
ord2089
ord1300
ord11209
msvcr100
_wcsicmp
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?what@exception@std@@UBEPBDXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
??0exception@std@@QAE@ABQBD@Z
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
srand
_mktime64
realloc
strchr
??1bad_cast@std@@UAE@XZ
??0bad_cast@std@@QAE@ABV01@@Z
malloc
__CxxFrameHandler3
_CxxThrowException
memset
??0bad_cast@std@@QAE@PBD@Z
_wtof
_wtoi
??0exception@std@@QAE@ABV01@@Z
free
memcpy
memcpy_s
memmove
??1exception@std@@UAE@XZ
rand
kernel32
GetFileInformationByHandle
FileTimeToSystemTime
Sleep
SetThreadUILanguage
GetThreadUILanguage
InterlockedDecrement
GetSystemTime
lstrlenA
LocalFree
GetLastError
CreateMutexW
CopyFileW
SetFileAttributesW
CreateDirectoryW
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileStringW
GetFileSize
SetFilePointer
ReadFile
CreateFileW
CloseHandle
WriteFile
UnmapViewOfFile
SystemTimeToFileTime
InterlockedExchange
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RemoveDirectoryW
WritePrivateProfileStringW
GetModuleFileNameW
GetTickCount
GetLocalTime
SetCurrentDirectoryW
DeleteFileW
IsProcessorFeaturePresent
user32
GetSystemMetrics
DrawIcon
GetWindowLongW
GetWindow
CreateWindowExW
GetWindowRect
SetRect
IsIconic
UpdateWindow
GetClientRect
AppendMenuW
IsWindow
GetParent
keybd_event
GetFocus
EnableWindow
GetKeyState
LoadIconW
MessageBoxExW
wsprintfW
GetDesktopWindow
PostMessageW
SendMessageW
ModifyMenuW
GetDlgCtrlID
GetSystemMenu
IsWindowVisible
shell32
ShellExecuteW
SHCreateDirectoryExW
comctl32
InitCommonControlsEx
oleaut32
SysAllocString
SysStringLen
SysAllocStringByteLen
SysFreeString
VariantClear
msvcp100
?_Xbad@tr1@std@@YAXW4error_type@regex_constants@12@@Z
??0_Locinfo@std@@QAE@PBD@Z
??1_Locinfo@std@@QAE@XZ
?_Getcoll@_Locinfo@std@@QBE?AU_Collvec@@XZ
??Bid@locale@std@@QAEIXZ
?_Incref@facet@locale@std@@QAEXXZ
?_Decref@facet@locale@std@@QAEPAV123@XZ
??1facet@locale@std@@UAE@XZ
??0facet@locale@std@@IAE@I@Z
?tolower@?$ctype@D@std@@QBEDD@Z
?tolower@?$ctype@D@std@@QBEPBDPADPBD@Z
?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?id@?$collate@D@std@@2V0locale@2@A
?_Xmem@tr1@std@@YAXXZ
?id@?$ctype@D@std@@2V0locale@2@A
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?_Init@locale@std@@CAPAV_Locimp@12@XZ
_Strxfrm
_Strcoll
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
ftpdll
FTPConnect
LocFileSend
FtpFileDownLoad
gettestinfo
ShowErrorMessage
GetMESDataOf
WriteUILog
GetENV_CFGDataOf
?GetRecipeData@@YAHPBDAAVCRecipeData@@@Z
?ReleaseRecipeData@@YAXAAVCRecipeData@@@Z
cta8280api
?SetJCETSubLotNo@@YAHPAD@Z
CTA8280TestStart
SetQAInfo
CTA8280EndBatch
?CTA8280setUIData@@YAHPADH@Z
?GUDlgShow@@YAHXZ
CTA8280save
CTA8280Load
CTA8280Start
CTA8280Exit
?SetUITestBinNO@@YAXPAD@Z
?SetGUFileName@@YAHPAD@Z
SetUIType
?UISetGUDlgFile@@YAHHPAD0@Z
sumxls
MDBtoCSV
SetTestCodePair
CreateHTMLSummary
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ