d:\临时项目\bin\ADPLUS_SW.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a264380bc8cd0d658126befdf556065be9e50164691917aa594dbb5254192b12.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a264380bc8cd0d658126befdf556065be9e50164691917aa594dbb5254192b12.exe
Resource
win10v2004-20240802-en
General
-
Target
a264380bc8cd0d658126befdf556065be9e50164691917aa594dbb5254192b12
-
Size
256KB
-
MD5
dcbfc0bdf2484923ec88d68d2d418717
-
SHA1
e2bce5a6affd128ebc679539d759c8943d6b710a
-
SHA256
a264380bc8cd0d658126befdf556065be9e50164691917aa594dbb5254192b12
-
SHA512
839aee59d14d13a478fd588599f22df70ea00ee498812d975952881c13a4e1e5aefa0ba2e9526a525a299d5ec05a7984f2f7e7cbb7db13f614407358cfc3fa5f
-
SSDEEP
3072:LL49mkhmG0nzY+vOTtawNlUN/31rGmYIxUdEBWBSu8eKLmvZH16e5ZkOu:/FTnzY+vkawNqN9vIwd+ZHAuM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a264380bc8cd0d658126befdf556065be9e50164691917aa594dbb5254192b12
Files
-
a264380bc8cd0d658126befdf556065be9e50164691917aa594dbb5254192b12.exe windows:5 windows x86 arch:x86
69501366f082ad9f95b8c019caa2c90f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteProcessMemory
GetCurrentProcess
VirtualQuery
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrlenA
GetTickCount
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
DeleteCriticalSection
ResumeThread
InterlockedDecrement
GetProcAddress
LoadLibraryA
SetProcessWorkingSetSize
GetSystemInfo
GetVersionExA
GetCurrentThreadId
ExitProcess
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LoadResource
SizeofResource
FindResourceA
InterlockedIncrement
GetModuleFileNameA
OutputDebugStringA
LoadLibraryExA
FreeLibrary
IsDBCSLeadByte
InterlockedExchange
GetSystemTimeAsFileTime
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
CreateFileA
SetFilePointer
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
CloseHandle
GetLastError
CreateMutexA
GetModuleHandleA
WaitForSingleObject
CreateThread
GetLocalTime
lstrcmpiA
Sleep
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
HeapReAlloc
VirtualFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
ExitThread
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetCommandLineA
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
GetStdHandle
WriteFile
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoA
user32
DefWindowProcA
TranslateMessage
EndPaint
PostQuitMessage
DispatchMessageA
GetClientRect
BeginPaint
TranslateAcceleratorA
DestroyWindow
LoadCursorA
RegisterClassExA
SystemParametersInfoA
CreateWindowExA
UpdateWindow
GetSystemMetrics
GetTopWindow
GetParent
ShowWindow
PostThreadMessageA
SetTimer
CharNextA
KillTimer
GetMessageA
LoadAcceleratorsA
advapi32
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
ole32
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
OleInitialize
OleUninitialize
StgCreateDocfile
OleCreate
oleaut32
VarUI4FromStr
SysAllocStringByteLen
SysStringByteLen
SysAllocString
VariantChangeType
VariantCopy
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
wsock32
closesocket
setsockopt
inet_ntoa
connect
WSAGetLastError
select
shutdown
ioctlsocket
gethostbyname
socket
htons
recv
send
__WSAFDIsSet
WSAStartup
WSACleanup
shlwapi
UrlUnescapeA
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
urlmon
CoInternetIsFeatureEnabled
CoInternetSetFeatureEnabled
dbghelp
ImageDirectoryEntryToData
Sections
.text Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 467B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ