e:\广告相关\广告\私服劫持\SFHook\release\GP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d4f30dbdbd996b7f2221aa3f02a143a63ff37b3efea5b8bc130f4cb0e79a74ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4f30dbdbd996b7f2221aa3f02a143a63ff37b3efea5b8bc130f4cb0e79a74ef.exe
Resource
win10v2004-20240802-en
General
-
Target
d4f30dbdbd996b7f2221aa3f02a143a63ff37b3efea5b8bc130f4cb0e79a74ef
-
Size
232KB
-
MD5
e694a015b689c89fefe6c6b667ba68b7
-
SHA1
8ad714bf24123d587d50462868370f923931d407
-
SHA256
d4f30dbdbd996b7f2221aa3f02a143a63ff37b3efea5b8bc130f4cb0e79a74ef
-
SHA512
4c783b0c4b728628e0783d7f16f5bd572bf6493d9a7914767c007236748bbd6581fb86a6187e53a7f6681e976a54ddf9b4adfae093fa8980755df3f3ac64b7fd
-
SSDEEP
3072:TRLiYu+vf3ybLycGuN+e8+Sjv21gy7pYq8+BvZdRpigtTrS:9ZuoSN+5qn7jBxpPrS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4f30dbdbd996b7f2221aa3f02a143a63ff37b3efea5b8bc130f4cb0e79a74ef
Files
-
d4f30dbdbd996b7f2221aa3f02a143a63ff37b3efea5b8bc130f4cb0e79a74ef.exe windows:4 windows x86 arch:x86
58d4df5b618ee57ca79c0b354e3e2c79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Process32NextW
CreateMutexA
GetModuleHandleW
GetWindowsDirectoryA
GetLocalTime
Process32FirstW
OpenProcess
OpenMutexA
CreateToolhelp32Snapshot
OutputDebugStringA
DuplicateHandle
SetUnhandledExceptionFilter
Sleep
GetLastError
GetCurrentProcess
GetProcAddress
CopyFileA
GetCurrentProcessId
GetModuleFileNameA
WaitNamedPipeA
WaitForSingleObject
SetEvent
ReadFile
GetTickCount
WriteFile
CreateEventA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
FlushFileBuffers
InterlockedExchange
CloseHandle
DeviceIoControl
GetFileSize
CreateFileA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStdHandle
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
RaiseException
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
LoadLibraryA
MultiByteToWideChar
GetLocaleInfoA
GetLocaleInfoW
SetFilePointer
InitializeCriticalSection
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
SetWinEventHook
SendMessageA
GetWindowThreadProcessId
DispatchMessageW
TranslateMessage
GetMessageW
FindWindowExA
GetWindowTextA
GetClassNameA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ShellExecuteA
psapi
GetModuleFileNameExA
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ