F:\SealRoot\C++\项目定制\深圳市交易集团\bin\Win32\Release\szcakeysvr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1485bc294abd398ac3eea38060a5765a2ee72e2628119af923e2a19b5509c79c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1485bc294abd398ac3eea38060a5765a2ee72e2628119af923e2a19b5509c79c.exe
Resource
win10v2004-20240802-en
General
-
Target
1485bc294abd398ac3eea38060a5765a2ee72e2628119af923e2a19b5509c79c
-
Size
252KB
-
MD5
b8805d3394aede044cbee0d08b397baa
-
SHA1
46c4355265e177348c2f579d11ba9374806e7bf6
-
SHA256
1485bc294abd398ac3eea38060a5765a2ee72e2628119af923e2a19b5509c79c
-
SHA512
777c716306c7c55748a1b9e11898e31493611cbe3d8f48e9b97062e02f7c64ad9a98f046a3da0734f31638b8fd9bd85714c0f60e7d983381285c52e8a354b2e5
-
SSDEEP
6144:l5LXd+3HcgbLpp3Y0ffPpt/Y625F/p/uwONct43j92U:3Dk3HcgnpXffPpt/r259pGHNu4B2U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1485bc294abd398ac3eea38060a5765a2ee72e2628119af923e2a19b5509c79c
Files
-
1485bc294abd398ac3eea38060a5765a2ee72e2628119af923e2a19b5509c79c.exe windows:6 windows x86 arch:x86
c93702142c3a9ef393193088d2b38dee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
hv
gettick_ms
?DefaultHeaders@@3V?$map@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V12@VStringCaseLess@hv@@V?$allocator@U?$pair@$$CBV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V12@@std@@@2@@std@@A
?open@WebSocketClient@hv@@QAEHPBDABV?$map@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V12@VStringCaseLess@hv@@V?$allocator@U?$pair@$$CBV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V12@@std@@@2@@std@@@Z
hv_md5
?send@WebSocketClient@hv@@QAEHABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z
??1WebSocketClient@hv@@UAE@XZ
??0WebSocketClient@hv@@QAE@V?$shared_ptr@VEventLoop@hv@@@std@@@Z
?close@WebSocketClient@hv@@QAEHXZ
?isConnected@?$TcpClientEventLoopTmpl@VWebSocketChannel@hv@@@hv@@QAE_NXZ
szutils
??8TString@TCommon@@QBE_NPB_W@Z
?Append@TBuffer@TCommon@@QAEHE@Z
?HexEncodeA@TBuffer@TCommon@@QAEPBDXZ
?IsEmpty@TString@TCommon@@QBE_NXZ
??0TString@TCommon@@QAE@ABV01@@Z
?Base64Decode@TBuffer@TCommon@@QAEHPBD@Z
?Base64EncodeA@TBuffer@TCommon@@QAEPBDXZ
?GetData@TBuffer@TCommon@@QBEPAEXZ
?GetLength@TBuffer@TCommon@@QBEKXZ
?CompareNoCase@TString@TCommon@@QBEHPB_W@Z
?UTF8Put@TString@TCommon@@QAE_NPBD@Z
?GetUnicode@TString@TCommon@@QAEPB_WXZ
??YTString@TCommon@@QAEABV01@PB_W@Z
?MakeUpper@TString@TCommon@@QAEXXZ
?HexEncode@TBuffer@TCommon@@QAEPB_WXZ
?Append@TBuffer@TCommon@@QAEHPBEK@Z
??1TBuffer@TCommon@@UAE@XZ
??0TBuffer@TCommon@@QAE@XZ
?GetAnsi@TString@TCommon@@QAEPBDXZ
??YTString@TCommon@@QAEABV01@ABV01@@Z
?Format@TString@TCommon@@QAAHPB_WZZ
?WriteLog@CTinyLog@TCommon@@SAHW4TLOGLEVEL@12@PB_WZZ
?SetLogLevel@CTinyLog@TCommon@@SAXW4TLOGLEVEL@12@@Z
??0TString@TCommon@@QAE@PB_WH@Z
??BTString@TCommon@@QBEPB_WXZ
??4TString@TCommon@@QAEABV01@PB_W@Z
??0TString@TCommon@@QAE@XZ
?GetUTF8@TString@TCommon@@QAEPBDXZ
?GetLength@TString@TCommon@@QBEHXZ
?Right@TString@TCommon@@QBE?AV12@H@Z
??4TString@TCommon@@QAEABV01@ABV01@@Z
?Find@TString@TCommon@@QBEHPB_WH@Z
?Mid@TString@TCommon@@QBE?AV12@HH@Z
??1TString@TCommon@@UAE@XZ
??0TString@TCommon@@QAE@PBDH@Z
?Empty@TBuffer@TCommon@@QAEXXZ
szca_ukeyengines
ord6
ord8
ord3
ord4
ord1
szca_decrypt
ord24
ord19
ord1
ord14
ord32
ord28
szca_x509reader
ord1
ord2
szsealread
ord2
ord4
ord3
ord1
szcavercertvalidity
VerifyCertValidity
GetLastErrorMsg
szimage
?ReleaseInstance@CSZImage@@SAXPAV1@@Z
?CreateInstance@CSZImage@@SAPAV1@XZ
mfc140u
ord8386
ord8470
ord462
ord2215
ord2246
ord7495
ord10472
ord8776
ord14128
ord286
ord5884
ord3009
ord5921
ord285
ord890
ord1391
ord11038
ord3833
ord6533
ord9210
ord10255
ord5790
ord12168
ord3265
ord3371
ord3372
ord3941
ord12124
ord2682
ord5935
ord13703
ord11717
ord6877
ord14596
ord7923
ord14590
ord3055
ord4494
ord8324
ord4502
ord4988
ord4927
ord4912
ord4974
ord5019
ord4942
ord4997
ord5013
ord4954
ord4960
ord4966
ord4948
ord5003
ord4936
ord1777
ord1756
ord1770
ord1744
ord1722
ord12258
ord12262
ord13878
ord3266
ord9235
ord11002
ord6978
ord12173
ord8965
ord14588
ord11936
ord3838
ord12089
ord9139
ord11726
ord11725
ord5652
ord10288
ord10284
ord10286
ord10287
ord10285
ord14785
ord2760
ord8210
ord3302
ord3305
ord13752
ord6218
ord3164
ord3403
ord3404
ord11396
ord11015
ord9040
ord12131
ord266
ord265
ord12865
ord5357
ord2486
ord12541
ord12542
ord14589
ord7922
ord14595
ord9398
ord4152
ord4090
ord12947
ord7941
ord2034
ord11982
ord11983
ord14466
ord12531
ord8000
ord14667
ord6348
ord14669
ord6350
ord14668
ord6349
ord3852
ord5918
ord12239
ord12247
ord4589
ord8217
ord10433
ord12251
ord12219
ord12928
ord5249
ord5549
ord5760
ord9350
ord5525
ord5763
ord5252
ord5411
ord5228
ord7722
ord7723
ord7712
ord5409
ord8219
ord10250
ord9209
ord6860
ord1113
ord6489
ord6566
ord3882
ord296
ord1045
ord4815
ord2304
ord1111
ord4092
ord13911
ord7313
ord13442
ord952
ord2205
ord7997
ord1472
ord995
ord7653
ord10379
ord1511
ord1513
ord2409
ord9693
kernel32
GetLastError
InitializeCriticalSectionEx
OutputDebugStringW
DeleteCriticalSection
GetPrivateProfileIntW
GetPrivateProfileStringW
GetModuleFileNameW
GetLocalTime
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
GetProcAddress
CloseHandle
CreateEventW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
user32
SendMessageW
SetTimer
IsIconic
LoadIconW
EnableWindow
KillTimer
DrawIcon
GetClientRect
GetSystemMetrics
comctl32
InitCommonControlsEx
msvcp140
?_Xlength_error@std@@YAXPBD@Z
?_Xbad_function_call@std@@YAXXZ
?_Xout_of_range@std@@YAXPBD@Z
vcruntime140
memset
wcsrchr
_purecall
__std_exception_copy
__std_exception_destroy
__std_terminate
__CxxFrameHandler3
_CxxThrowException
memchr
memcpy
_except_handler4_common
memmove
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
localeconv
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vsprintf
__p__commode
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_invalid_parameter_noinfo
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_seh_filter_exe
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_invalid_parameter_noinfo_noreturn
_errno
_controlfp_s
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
api-ms-win-crt-math-l1-1-0
_dtest
_dsign
_except1
__setusermatherr
api-ms-win-crt-convert-l1-1-0
strtoll
strtoull
strtod
api-ms-win-crt-time-l1-1-0
_mktime64
_localtime64_s
Sections
.text Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ