e:\KINGSOFT_DUBA\Build\Build_Src\kisengine\kis_healtheye_kdesk_2020_fb\product\win32\dbginfo\keyemain.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c35ccf4f0dbac8610c4e59476bc5ff042d2d0ea28f2eda2ec84c106b68c09104.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c35ccf4f0dbac8610c4e59476bc5ff042d2d0ea28f2eda2ec84c106b68c09104.exe
Resource
win10v2004-20240802-en
General
-
Target
c35ccf4f0dbac8610c4e59476bc5ff042d2d0ea28f2eda2ec84c106b68c09104
-
Size
302KB
-
MD5
2d054fba549e43c828ab520cda21cc72
-
SHA1
42ded331e20206dba869a7f2dab13b43c991b7cd
-
SHA256
c35ccf4f0dbac8610c4e59476bc5ff042d2d0ea28f2eda2ec84c106b68c09104
-
SHA512
e495c5dfed43f7a054c567a5b4b56b33a1062880b955b2f5c83b4b0226014f73bec9c19721ccbf69d9942a3df059b877d6d512d9122bfaf021128d6743c939b6
-
SSDEEP
6144:jcH0RnBqF4nS5GvZnOrVBwdQpwHpKjAjt19o:jcU5BqiS5GB6ydYyM219o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c35ccf4f0dbac8610c4e59476bc5ff042d2d0ea28f2eda2ec84c106b68c09104
Files
-
c35ccf4f0dbac8610c4e59476bc5ff042d2d0ea28f2eda2ec84c106b68c09104.exe windows:4 windows x86 arch:x86
5c95eeda546c1bf31c88aa06a04851ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileW
GetFileSize
ReadFile
lstrlenW
GetPrivateProfileStringW
CreateToolhelp32Snapshot
Process32FirstW
Module32FirstW
Process32NextW
TerminateProcess
GetSystemDirectoryW
GetVersionExW
SetFilePointer
LocalAlloc
GetSystemTimeAsFileTime
InterlockedCompareExchange
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetFileAttributesW
LocalFree
FileTimeToSystemTime
GetSystemTime
LockResource
GetLocalTime
GetCurrentThreadId
SizeofResource
FindFirstFileW
GetLastError
LeaveCriticalSection
CreateMutexW
EnterCriticalSection
FindResourceW
FreeLibrary
DeleteCriticalSection
Sleep
CreateDirectoryW
CloseHandle
OpenMutexW
InitializeCriticalSection
GetCurrentProcess
FlushInstructionCache
SetLastError
GetProcAddress
DeleteFileW
LoadLibraryW
MultiByteToWideChar
RaiseException
GetModuleFileNameW
FindResourceExW
GetModuleHandleW
FindClose
GetTickCount
LoadResource
user32
CreatePopupMenu
DispatchMessageW
UnregisterClassA
PeekMessageW
GetMessageW
AppendMenuW
TranslateMessage
TrackPopupMenuEx
RegisterWindowMessageW
PostMessageW
RegisterClassExW
FindWindowW
SetWindowLongW
LoadCursorW
CreateWindowExW
SetWindowTextW
DestroyMenu
MonitorFromPoint
GetCursorPos
GetClassInfoExW
GetMonitorInfoW
SetForegroundWindow
DestroyWindow
GetWindowLongW
LoadIconW
PostQuitMessage
DestroyIcon
CallWindowProcW
DefWindowProcW
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyW
shell32
Shell_NotifyIconW
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
ole32
CoUninitialize
CoInitialize
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
shlwapi
PathRemoveFileSpecW
PathAppendW
PathFindFileNameW
PathAddBackslashW
msvcp80
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
?rfind@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??A?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAA_WI@Z
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
imm32
ImmDisableIME
msvcr80
strcmp
_CxxThrowException
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
wcsncmp
isalpha
??3@YAXPAX@Z
wcscat
vswprintf_s
memcpy_s
wcscat_s
_recalloc
_wtoi
iswspace
wcscmp
memmove_s
memset
??2@YAPAXI@Z
_vscwprintf
fflush
fclose
swprintf_s
_wfopen
wcslen
wcsrchr
_beginthreadex
_wcslwr_s
wcsstr
fwprintf
_waccess
ceil
wcscpy_s
_purecall
free
??_V@YAXPAX@Z
strlen
_invalid_parameter_noinfo
wcschr
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@XZ
wcspbrk
??0exception@std@@QAE@ABV01@@Z
?what@exception@std@@UBEPBDXZ
malloc
wcsncpy_s
calloc
_wcstoui64
_wcsnicmp
memcpy
__CxxFrameHandler3
memmove
_vsnprintf_s
fprintf
sscanf_s
strncmp
isspace
strchr
isalnum
tolower
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE