d:\临时项目\bin\ADPLUS_SW.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3eab694dec67788f92e6f39a02842564dacb3e71052e2fe70766e9a41e5373e8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3eab694dec67788f92e6f39a02842564dacb3e71052e2fe70766e9a41e5373e8.exe
Resource
win10v2004-20240802-en
General
-
Target
3eab694dec67788f92e6f39a02842564dacb3e71052e2fe70766e9a41e5373e8
-
Size
257KB
-
MD5
ceebb8980fc457f59a2471273feb998e
-
SHA1
ebaf66e42851e920ce404688c6189301c205f9fe
-
SHA256
3eab694dec67788f92e6f39a02842564dacb3e71052e2fe70766e9a41e5373e8
-
SHA512
025f689c8c1ef1b16d01c919a2b0b10cb9d2954039e334af1c6d0d5a54f18418705d2407873f2b1a8b8e7772c2c7f31c5e83c912b51d9cd65ad35d82e0daaefd
-
SSDEEP
3072:UhWunyJGLyH9qKOzCaVUikfu8JyH5g58HWMgeqUm8ZqTQD/Gn7e5TDjHV:UhhDydqKTaVUikJJb4g8ZqhsDjHV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3eab694dec67788f92e6f39a02842564dacb3e71052e2fe70766e9a41e5373e8
Files
-
3eab694dec67788f92e6f39a02842564dacb3e71052e2fe70766e9a41e5373e8.exe windows:5 windows x86 arch:x86
fa982d14be84880ca0693893819fd8b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteProcessMemory
GetCurrentProcess
VirtualQuery
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrlenA
GetTickCount
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
DeleteCriticalSection
ResumeThread
InterlockedDecrement
GetProcAddress
LoadLibraryA
SetProcessWorkingSetSize
GetSystemInfo
GetVersionExA
GetCurrentThreadId
ExitProcess
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LoadResource
SizeofResource
FindResourceA
InterlockedIncrement
GetModuleFileNameA
lstrcmpiA
FreeLibrary
IsDBCSLeadByte
InterlockedExchange
GetSystemTimeAsFileTime
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
CreateFileA
SetFilePointer
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
OutputDebugStringA
CloseHandle
GetLastError
CreateMutexA
GetModuleHandleA
WaitForSingleObject
CreateThread
LoadLibraryExA
Sleep
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
HeapReAlloc
VirtualFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
ExitThread
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetCommandLineA
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
GetStdHandle
WriteFile
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoA
user32
DefWindowProcA
TranslateMessage
EndPaint
PostQuitMessage
DispatchMessageA
GetClientRect
BeginPaint
TranslateAcceleratorA
DestroyWindow
LoadCursorA
RegisterClassExA
SystemParametersInfoA
CreateWindowExA
UpdateWindow
GetSystemMetrics
GetTopWindow
GetParent
ShowWindow
PostThreadMessageA
SetTimer
CharNextA
KillTimer
GetMessageA
LoadAcceleratorsA
advapi32
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
ole32
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
OleInitialize
OleUninitialize
StgCreateDocfile
OleCreate
oleaut32
VarUI4FromStr
SysAllocStringByteLen
SysStringByteLen
SysAllocString
VariantChangeType
VariantCopy
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
wsock32
closesocket
setsockopt
inet_ntoa
connect
WSAGetLastError
select
shutdown
ioctlsocket
gethostbyname
socket
htons
recv
send
__WSAFDIsSet
WSAStartup
WSACleanup
shlwapi
UrlUnescapeA
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
urlmon
CoInternetIsFeatureEnabled
CoInternetSetFeatureEnabled
dbghelp
ImageDirectoryEntryToData
Sections
.text Size: 199KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 442B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ