e:\广告相关\广告\私服劫持\SFHook\桌标\bin\release\DK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6aa41149fee3690e6e2acd2db2f75abfeb82954fa2978e8d992b4b77cb612aaa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6aa41149fee3690e6e2acd2db2f75abfeb82954fa2978e8d992b4b77cb612aaa.exe
Resource
win10v2004-20240802-en
General
-
Target
6aa41149fee3690e6e2acd2db2f75abfeb82954fa2978e8d992b4b77cb612aaa
-
Size
3.9MB
-
MD5
d967566f7f19f2c3cb42f4206b68164c
-
SHA1
7d5c651fcbd5640b0f6d159efced67fbd406d8f1
-
SHA256
6aa41149fee3690e6e2acd2db2f75abfeb82954fa2978e8d992b4b77cb612aaa
-
SHA512
fd261d8915aca27c0f556d9c7d576f69084d1883ee67a2a7d064076cf4ddbff9c30ac995a04ff6360ba03722c1c9d00d562c2794a69578937bbf7602307370e2
-
SSDEEP
49152:gKS91T1sdqKyf62PIn55QZuTtS0rQMYOQ+q8CEZSW5wppXG1ZS9KFeMbzlk:gKS/T1sIg2PyWsM0r1QneS3G180Fe7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6aa41149fee3690e6e2acd2db2f75abfeb82954fa2978e8d992b4b77cb612aaa
Files
-
6aa41149fee3690e6e2acd2db2f75abfeb82954fa2978e8d992b4b77cb612aaa.exe windows:4 windows x86 arch:x86
877008e92a706fd7725e44ab28088f64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenProcess
WaitNamedPipeA
Process32NextW
FindNextFileA
EnterCriticalSection
GetCurrentProcessId
OpenEventA
ReadFile
FindFirstFileA
GetCurrentThreadId
OutputDebugStringA
GetLastError
OpenFileMappingA
CreateMutexA
MapViewOfFile
UnmapViewOfFile
FindClose
LocalFree
GetWindowsDirectoryA
LeaveCriticalSection
GetLocalTime
GetFileAttributesA
ResumeThread
SetEvent
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
GetLogicalDriveStringsA
GetModuleFileNameA
GetFileSize
GetProcessTimes
DeleteFileA
DuplicateHandle
SetFileAttributesA
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetTickCount
WaitForSingleObject
CreateEventA
Sleep
CreateToolhelp32Snapshot
SetEndOfFile
GetLocaleInfoW
IsValidLocale
InitializeCriticalSection
CreateFileMappingA
CopyFileA
OpenMutexA
OpenThread
SetUnhandledExceptionFilter
Process32FirstW
WriteFile
CloseHandle
DeviceIoControl
CreateDirectoryA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
GetStringTypeW
GetStringTypeA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
InterlockedExchange
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
ExitThread
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
RaiseException
HeapSize
GetConsoleCP
GetConsoleMode
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FlushFileBuffers
user32
GetClassNameA
GetWindowThreadProcessId
wsprintfA
GetMessageW
TranslateMessage
DispatchMessageW
SetWinEventHook
GetWindowTextA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
SetNamedSecurityInfoA
RegOpenKeyExA
RegEnumKeyExA
GetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
BuildExplicitAccessWithNameA
RegDeleteValueA
shell32
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
GetModuleFileNameExA
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
InternetQueryOptionA
InternetReadFile
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
InternetConnectA
Sections
.text Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ