e:\广告相关\广告\私服劫持\SFHook\release\GP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bb4332da4ce5ff3f39e20c27cdf10b8978278a4724db2b598589a5c5aa6b1f56.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bb4332da4ce5ff3f39e20c27cdf10b8978278a4724db2b598589a5c5aa6b1f56.exe
Resource
win10v2004-20240802-en
General
-
Target
bb4332da4ce5ff3f39e20c27cdf10b8978278a4724db2b598589a5c5aa6b1f56
-
Size
240KB
-
MD5
05f25fb149a023eaad59877457c2933f
-
SHA1
2e2fb8dae1d0efab3cbe1b1cf30d8386d98e1a2b
-
SHA256
bb4332da4ce5ff3f39e20c27cdf10b8978278a4724db2b598589a5c5aa6b1f56
-
SHA512
b68de8b0536eaab983c554769e1c1c3b8710e27836c8b7fa66c94c09d740a093f34f5bdbb419507e1d9dad52de4050809c97f99923180dcf22d61d3109672d48
-
SSDEEP
3072:uqOR/Qt60Xp5w74b5xshceD/JobEXg9f7x3fV9KZ74G2XktBR+:cRYtJjUhn/W7VfzInF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb4332da4ce5ff3f39e20c27cdf10b8978278a4724db2b598589a5c5aa6b1f56
Files
-
bb4332da4ce5ff3f39e20c27cdf10b8978278a4724db2b598589a5c5aa6b1f56.exe windows:4 windows x86 arch:x86
a1140c1dd29d7d2b70e2c9681c64af37
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
Process32NextW
CreateMutexA
GetModuleHandleW
GetLocalTime
GetWindowsDirectoryA
Process32FirstW
OpenMutexA
OpenProcess
CreateToolhelp32Snapshot
OutputDebugStringA
DuplicateHandle
SetUnhandledExceptionFilter
Sleep
GetLastError
GetCurrentProcess
GetProcAddress
CopyFileA
GetCurrentProcessId
GetFileSize
WaitNamedPipeA
WaitForSingleObject
SetEvent
ReadFile
GetTickCount
WriteFile
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
FlushFileBuffers
CloseHandle
DeviceIoControl
CreateEventA
CreateFileA
InterlockedExchange
IsValidLocale
EnumSystemLocalesA
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStdHandle
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
RaiseException
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
LoadLibraryA
MultiByteToWideChar
GetLocaleInfoA
GetLocaleInfoW
SetFilePointer
InitializeCriticalSection
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
user32
GetClassNameA
DispatchMessageW
TranslateMessage
GetMessageW
FindWindowExA
GetWindowTextA
SetWinEventHook
GetWindowThreadProcessId
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ShellExecuteA
psapi
GetModuleFileNameExA
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ