F:\Project\洛奇登陆器\Release\NGM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
88a06748a9650cb62f2220aa2bc08aee428ef55ad4c25a6582c9d8c405f61701.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
88a06748a9650cb62f2220aa2bc08aee428ef55ad4c25a6582c9d8c405f61701.exe
Resource
win10v2004-20240802-en
General
-
Target
88a06748a9650cb62f2220aa2bc08aee428ef55ad4c25a6582c9d8c405f61701
-
Size
877KB
-
MD5
b5c10690032ab95d03a3511de88d28e6
-
SHA1
436e17a63ea46477bef4b9b756998b908148b2c4
-
SHA256
88a06748a9650cb62f2220aa2bc08aee428ef55ad4c25a6582c9d8c405f61701
-
SHA512
0d905ba6413756dc7329992ed94ed8f407403b59502b079861e5628ff55447dd1f0486f03d3be5c98df2fb0140aaeaa2d649e9b9633f1403925a0256df18952a
-
SSDEEP
12288:zBoCAtR8IMCH0HallE0CZlI/ZCIlh+rffca/Q31Tc2kLQYpOH3gp4xWqaoTNuvst:zabMCH0HavyZIZC2QHWgL6O8Yvudz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88a06748a9650cb62f2220aa2bc08aee428ef55ad4c25a6582c9d8c405f61701
Files
-
88a06748a9650cb62f2220aa2bc08aee428ef55ad4c25a6582c9d8c405f61701.exe windows:5 windows x86 arch:x86
4be817ac22508dfbfdb1ebf9e5d7a3d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetModuleHandleW
SetErrorMode
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetCPInfo
GetOEMCP
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapFree
RtlUnwind
ExitProcess
ExitThread
RaiseException
VirtualProtect
FileTimeToSystemTime
GetSystemInfo
VirtualQuery
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
VirtualFree
HeapCreate
GetACP
IsValidCodePage
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
FindNextFileA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
MultiByteToWideChar
MulDiv
GetCurrentProcessId
GlobalAddAtomA
SetThreadPriority
GlobalUnlock
lstrlenA
GlobalFree
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
WritePrivateProfileStringA
GetCurrentDirectoryA
FreeResource
WriteFile
GetPrivateProfileStringA
CreateEventA
RemoveDirectoryA
SetFileAttributesA
TerminateProcess
GetExitCodeProcess
GetTickCount
CreateProcessA
Process32Next
Process32First
Sleep
ResumeThread
SuspendThread
SetLastError
CreateToolhelp32Snapshot
GetCurrentProcess
DeleteFileA
LockResource
CreateFileA
SizeofResource
LoadResource
FindResourceA
lstrcmpiA
GetLastError
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
WaitForSingleObject
CreateThread
CloseHandle
ResetEvent
SetEvent
WriteConsoleA
GetStdHandle
VirtualAlloc
user32
PostThreadMessageA
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
LoadCursorA
SetCapture
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
UnregisterClassA
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CharUpperA
UnhookWindowsHookEx
GetMenuItemID
MessageBoxA
GetSysColorBrush
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetLastActivePopup
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
RegisterClipboardFormatA
ValidateRect
SetMenuItemBitmaps
DestroyMenu
GetMessageTime
GetTopWindow
MessageBeep
EnableWindow
LoadIconA
SetCursorPos
mouse_event
PostMessageA
keybd_event
SendMessageA
GetWindowLongA
SetWindowLongA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
wsprintfA
FillRect
OffsetRect
GetSysColor
DrawTextA
GetWindowRect
PostQuitMessage
SetWindowPos
MapDialogRect
GetParent
SetWindowContextHelpId
GetWindow
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RemovePropA
gdi32
CreateRectRgnIndirect
DeleteDC
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
CreateSolidBrush
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateBitmap
GetStockObject
SelectObject
GetTextMetricsA
CreateFontA
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetPathFromIDListA
DragQueryFileA
DragFinish
SHBrowseForFolderA
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
oledlg
ord8
ole32
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoRevokeClassObject
CoFreeUnusedLibraries
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
OleInitialize
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
urlmon
URLDownloadToFileA
ws2_32
WSACleanup
wininet
DeleteUrlCacheEntry
rasapi32
RasEnumConnectionsA
RasGetEntryDialParamsA
RasDialA
RasHangUpA
Sections
.text Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 516KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ