E:\beiguard-gameshield2\QianNiao\pebinder-master\allfile\allfile\Release\allfile.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe
Resource
win7-20240704-en
General
-
Target
1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984
-
Size
9.1MB
-
MD5
8c4a8c70e65686184b1713fd5d9475e5
-
SHA1
b4ae29264869f932d999b7d9729eee4543bd0747
-
SHA256
1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984
-
SHA512
692447b769f0e4d0401713ed494c4160fe37cdff37584d62cb7b24a778a3e6ea91d2291f3c3b7ffb0d151ffd91ea12461e40c4d2b5c7d5e7f538c2c3d614ad7a
-
SSDEEP
196608:yW1pXAmPFRLzZCZW8/PgcSS3uQyl620Y:yW1pwmPFRXgHeQ8620
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984
Files
-
1aa39d856320c84715f02d2bcbc6d800b5a7a431ebd10cb014b1cd11ea38d984.exe windows:6 windows x86 arch:x86
9094aec2994d89b974208d5eb414e568
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
crypt32
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CertFreeCertificateChain
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertGetCertificateChain
CertOpenStore
ws2_32
WSAIoctl
setsockopt
WSACleanup
WSAStartup
WSASetLastError
ntohs
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockopt
htons
gethostname
ioctlsocket
getpeername
sendto
recvfrom
freeaddrinfo
getaddrinfo
recv
listen
htonl
getsockname
connect
bind
accept
select
__WSAFDIsSet
socket
wldap32
ord143
ord217
ord46
ord211
ord60
ord45
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
normaliz
IdnToUnicode
IdnToAscii
kernel32
FindClose
GetTimeZoneInformation
SetEndOfFile
SetStdHandle
GetFileAttributesExW
HeapReAlloc
FlushFileBuffers
HeapAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapFree
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetModuleHandleExW
GetFullPathNameW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RaiseException
RtlUnwind
InitializeSListHead
GetStartupInfoW
GetLastError
CloseHandle
GetModuleFileNameA
CreateFileW
ReadFile
GetModuleHandleA
FindResourceA
LoadResource
SizeofResource
LockResource
GetFileAttributesW
GetFileAttributesA
MultiByteToWideChar
CreateDirectoryW
WideCharToMultiByte
SetFileAttributesW
SetFileAttributesA
GetModuleFileNameW
LoadLibraryExW
FindResourceW
FindNextFileW
MoveFileW
FreeLibrary
DeleteFileA
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
K32GetModuleFileNameExW
Process32NextW
TerminateProcess
FormatMessageA
LocalFree
CreateFileA
GetUserDefaultUILanguage
GetCurrentDirectoryW
CreateProcessW
ExitProcess
Sleep
DeleteFileW
CreateDirectoryA
CreateProcessA
GetFileSizeEx
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
SetLastError
FormatMessageW
QueryPerformanceCounter
GetTickCount
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceFrequency
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetCurrentProcessId
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
SleepEx
VerSetConditionMask
VerifyVersionInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
CompareStringEx
WakeAllConditionVariable
GetModuleHandleW
WriteConsoleW
GetSystemTimeAsFileTime
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
HeapSize
FindFirstFileExW
WriteFile
LCMapStringEx
DecodePointer
EncodePointer
GetLocaleInfoEx
GetExitCodeThread
GetCurrentThreadId
GetStringTypeW
user32
RegisterClassA
GetSystemMetrics
DefWindowProcA
UpdateWindow
GetMessageA
TranslateMessage
PostQuitMessage
GetParent
SendMessageA
MessageBoxA
DispatchMessageA
ShowWindow
CreateWindowExA
PostMessageA
advapi32
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptDestroyKey
CryptImportKey
CryptEncrypt
shell32
SHGetFolderPathA
SHGetFolderPathW
SHGetKnownFolderPath
ShellExecuteExA
ShellExecuteExW
ole32
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoInitialize
shlwapi
PathFileExistsW
PathCombineA
PathFileExistsA
PathRemoveFileSpecW
PathCombineW
PathRemoveFileSpecA
bcrypt
BCryptGenRandom
Sections
.text Size: 815KB - Virtual size: 815KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8.1MB - Virtual size: 8.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ