H:\我的工作\破天一剑新版本\实验\新建文件夹\实验PT20160712-v21\新建文件夹\实验\实验PT20210112-v46测试加速人怪扫描\Release\PT.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5716e49b3cca8e26ba995ffe5657e7760ed54329ce6ddfc431ccaadcb63221f8.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5716e49b3cca8e26ba995ffe5657e7760ed54329ce6ddfc431ccaadcb63221f8.dll
Resource
win10v2004-20240802-en
General
-
Target
5716e49b3cca8e26ba995ffe5657e7760ed54329ce6ddfc431ccaadcb63221f8
-
Size
1.8MB
-
MD5
8808d7335ca8768c0435b209763cb3b0
-
SHA1
63cdac7ee3f171437e5cb9fe88ad6689943603af
-
SHA256
5716e49b3cca8e26ba995ffe5657e7760ed54329ce6ddfc431ccaadcb63221f8
-
SHA512
66268511c6e8f629669b6422112080b98b0244d59635aceeb820e55a4dadf62a15ad2cdaa2430d64445a4962d5d7334d20e9e199ca12f84fccd5e97a21b03909
-
SSDEEP
49152:HDcLBglO5Mntco8fdwi0g+64HelAw5qm:jcLBglO5MntlCdwTg+64+ln5qm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5716e49b3cca8e26ba995ffe5657e7760ed54329ce6ddfc431ccaadcb63221f8
Files
-
5716e49b3cca8e26ba995ffe5657e7760ed54329ce6ddfc431ccaadcb63221f8.dll windows:5 windows x86 arch:x86
c13e3bc55f37ebae804e9e7cbe1f8bf6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
gdi32
GetCharABCWidthsA
GetTextExtentPoint32A
TextOutA
SetBkMode
SetTextColor
RoundRect
CreatePenIndirect
SetBkColor
ExtTextOutA
SetStretchBltMode
GetDeviceCaps
CombineRgn
GetClipBox
CreateRectRgnIndirect
ExtSelectClipRgn
SelectClipRgn
CreateRoundRectRgn
CreateCompatibleBitmap
SaveDC
BitBlt
RestoreDC
Rectangle
SetWindowOrgEx
DeleteDC
GetStockObject
GetObjectA
CreateFontIndirectA
GetTextMetricsA
MoveToEx
StretchBlt
SelectObject
LineTo
DeleteObject
CreateSolidBrush
CreatePen
CreateCompatibleDC
CreateDIBSection
winmm
sndPlaySoundA
shell32
ShellExecuteA
ws2_32
send
recv
socket
connect
closesocket
inet_addr
htons
advapi32
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyA
RegOpenKeyExA
comctl32
_TrackMouseEvent
ord17
user32
GetWindowRect
wvsprintfA
CreateAcceleratorTableA
InvalidateRgn
SetWindowTextA
GetWindowTextLengthA
GetWindowTextA
GetSysColor
SetCaretPos
ShowCaret
HideCaret
CreateCaret
SetRect
CharPrevA
DrawTextA
SetWindowRgn
MonitorFromWindow
GetMonitorInfoA
CharNextA
IntersectRect
GetClassInfoExA
RegisterClassExA
RegisterClassA
SetPropA
GetPropA
SystemParametersInfoA
EnableWindow
DefWindowProcA
GetParent
GetCursorPos
GetWindow
GetUpdateRect
BeginPaint
EndPaint
IsRectEmpty
MapWindowPoints
CreateWindowExA
GetFocus
SetFocus
DestroyWindow
ReleaseCapture
SetCapture
IsWindow
InvalidateRect
GetWindowLongA
GetKeyState
LoadCursorA
SetCursor
InflateRect
OffsetRect
LoadImageA
FillRect
ReleaseDC
GetDC
FindWindowA
ShowWindow
SendMessageA
CallNextHookEx
SetWindowsHookExA
PtInRect
PostMessageA
MoveWindow
UnregisterHotKey
RegisterHotKey
UnhookWindowsHookEx
SetWindowLongA
ClientToScreen
SetForegroundWindow
GetKeyboardState
GetActiveWindow
SetWindowPos
CallWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
ScreenToClient
GetClientRect
KillTimer
SetTimer
IsZoomed
IsIconic
PostQuitMessage
MessageBoxA
ole32
CLSIDFromString
CLSIDFromProgID
CoInitialize
OleLockRunning
CoCreateInstance
CoUninitialize
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
VariantClear
VariantInit
kernel32
SetEndOfFile
SetEnvironmentVariableA
FormatMessageA
LoadLibraryExA
GetTempPathA
GetFileAttributesExW
WaitForSingleObject
GetExitCodeProcess
CreatePipe
SetFilePointer
CreateFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
OutputDebugStringW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
CreateDirectoryW
GetTimeZoneInformation
LoadLibraryExW
DeleteFileW
SetFilePointerEx
ReadConsoleW
HeapSize
GetConsoleMode
GetConsoleCP
GetModuleFileNameW
GetStdHandle
GetProcessHeap
GetCPInfo
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
UnhandledExceptionFilter
HeapReAlloc
GetCommandLineA
GetSystemTimeAsFileTime
AreFileApisANSI
GetModuleHandleExW
DecodePointer
EncodePointer
HeapAlloc
HeapFree
RtlUnwind
RaiseException
IsProcessorFeaturePresent
IsDebuggerPresent
InterlockedDecrement
InterlockedIncrement
MulDiv
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
DuplicateHandle
GetFileType
LockResource
ExitProcess
GetACP
FindResourceA
SizeofResource
LoadResource
FreeResource
SetConsoleWindowInfo
GetPrivateProfileStringA
CreateEventA
Beep
WaitForMultipleObjects
SetEvent
TerminateProcess
FindNextFileA
FindFirstFileA
FindClose
GetCurrentDirectoryA
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
VirtualProtect
GetTickCount
CreateProcessA
GetModuleHandleA
SetUnhandledExceptionFilter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WriteFile
ReadFile
MoveFileExW
CloseHandle
GetLocalTime
CreateFileA
GetCurrentProcess
DeviceIoControl
GetVersionExA
CreateThread
GetCurrentProcessId
FreeLibrary
GetProcAddress
GetLastError
LoadLibraryA
GetModuleFileNameA
Sleep
GetCurrentThreadId
GetFileSize
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 262KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 330KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ