E:\SSD(D)\A造价软件\Standard\文件保存dll\v11\branch_net\x64\Release\FileEncrypt_NET.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3ca5ac97e07b2ef037494edd3923865f4190e03f5a9e08c520628019a75a82d9.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ca5ac97e07b2ef037494edd3923865f4190e03f5a9e08c520628019a75a82d9.dll
Resource
win10v2004-20240802-en
General
-
Target
3ca5ac97e07b2ef037494edd3923865f4190e03f5a9e08c520628019a75a82d9
-
Size
356KB
-
MD5
a117a9acae023e2b06a3b2e3d9e7a237
-
SHA1
a98129c81076f5d99257dd63a48fb4b30b155607
-
SHA256
3ca5ac97e07b2ef037494edd3923865f4190e03f5a9e08c520628019a75a82d9
-
SHA512
4bcf4e668d381a12f286f8dc19c592b7c2cbbeb4492668771108f4adb9f995293935fa964b6bf172330db35890f487b6868c9bb5605ccf88769c6d74e6858267
-
SSDEEP
6144:sH8rDqSDGHDBjwMwe219BfbQ09WK9luTonNkyDlQoxcNpt:sH8FKdjw3es9ljMk7kyDmoWR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ca5ac97e07b2ef037494edd3923865f4190e03f5a9e08c520628019a75a82d9
Files
-
3ca5ac97e07b2ef037494edd3923865f4190e03f5a9e08c520628019a75a82d9.dll windows:6 windows x64 arch:x64
eb66c26af4059260d66ecb436ddaa772
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FreeResource
LoadResource
LockResource
SizeofResource
FindResourceW
FreeLibrary
GetProcAddress
LoadLibraryW
GetLocalTime
GetModuleFileNameA
GetLastError
SetLastError
FormatMessageA
SetEndOfFile
OutputDebugStringW
CreateFileW
LoadLibraryExW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteConsoleW
SetStdHandle
GetModuleFileNameW
GetProcessHeap
GetOEMCP
GetACP
IsValidCodePage
GetFileType
GetStdHandle
SetFilePointerEx
FlushFileBuffers
CloseHandle
IsDebuggerPresent
HeapSize
AreFileApisANSI
GetModuleHandleExW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
GetSystemTimeAsFileTime
ReadFile
GetCPInfo
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleW
WriteFile
GetConsoleCP
GetCommandLineA
GetCurrentThreadId
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsProcessorFeaturePresent
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
shell32
ShellExecuteA
ws2_32
WSAStartup
gethostbyname
socket
shutdown
setsockopt
sendto
send
select
recvfrom
recv
inet_addr
htons
getsockopt
ioctlsocket
connect
closesocket
accept
__WSAFDIsSet
WSAGetLastError
ntohl
Sections
.text Size: 245KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ