D:\VS2017\魔域项目\魔域全自动\x64\Release\计时九星exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
80862d55b902db3a944e68dad53397ee48bb0cd5c4dca92a9a8d764565edbf7e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
80862d55b902db3a944e68dad53397ee48bb0cd5c4dca92a9a8d764565edbf7e.exe
Resource
win10v2004-20240802-en
General
-
Target
80862d55b902db3a944e68dad53397ee48bb0cd5c4dca92a9a8d764565edbf7e
-
Size
219KB
-
MD5
ba5d50b5dc566a08a2e190de77b5b3ab
-
SHA1
2846a4af303bfef57a1e18f940df48d1693a80cd
-
SHA256
80862d55b902db3a944e68dad53397ee48bb0cd5c4dca92a9a8d764565edbf7e
-
SHA512
1f48316e24d0f5cbc11af7ffeb4734f948f72802f4702170b9cba716db278b51ea2d1bf6a618663b5f7b95334f3071749900bedcb3c92f5a0848592459f91ce2
-
SSDEEP
3072:BkS/fKDl0DoqkJyZpt48Gh940VhUiGOfZMLdcarKFOKaVpXtALxE16o7dOMYiegz:BkS/fKkC7/40nlZMVP6GAo7d6G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 80862d55b902db3a944e68dad53397ee48bb0cd5c4dca92a9a8d764565edbf7e
Files
-
80862d55b902db3a944e68dad53397ee48bb0cd5c4dca92a9a8d764565edbf7e.exe windows:6 windows x64 arch:x64
9fc558727f4c69e77d5c0eade7a13d40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
inet_pton
listen
WSAStartup
select
closesocket
bind
accept
__WSAFDIsSet
WSACleanup
socket
connect
recv
htons
send
shutdown
WSAGetLastError
winmm
timeGetTime
wininet
InternetQueryOptionW
InternetQueryDataAvailable
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetCloseHandle
InternetSetOptionW
HttpQueryInfoW
ntdll
RtlNtStatusToDosError
RtlExitUserThread
RtlInitString
RtlCompareString
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlCompareUnicodeString
NtTerminateProcess
NtMapViewOfSection
NtCreateSection
NtQuerySection
NtOpenSection
NtUnmapViewOfSection
RtlSetLastWin32ErrorAndNtStatusFromNtStatus
NtReadVirtualMemory
RtlInitUnicodeString
NtQuerySystemInformation
NtWriteVirtualMemory
kernel32
LoadLibraryA
GetSystemDirectoryW
DeviceIoControl
LockResource
GetFileSizeEx
ReleaseMutex
SetThreadContext
Wow64SuspendThread
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
SuspendThread
Wow64GetThreadContext
Wow64SetThreadContext
VirtualProtect
FormatMessageA
LocalFree
OutputDebugStringA
LoadLibraryW
VirtualQueryEx
VirtualQuery
MultiByteToWideChar
OpenThread
IsWow64Process
VirtualFreeEx
ExitProcess
VirtualAllocEx
WaitForSingleObject
GetThreadContext
FindResourceW
LoadResource
ReadFile
FindFirstFileA
VirtualFree
WriteFile
VirtualAlloc
FindNextFileA
lstrlenA
FindClose
GetLastError
CreateFileA
CloseHandle
GetLocalTime
GetFileSize
GetFileTime
CreateDirectoryW
GetModuleFileNameA
RemoveVectoredExceptionHandler
GetCurrentProcess
lstrlenW
GetModuleFileNameW
GetCurrentDirectoryA
GetModuleHandleA
OpenProcess
GetSystemDirectoryA
AddVectoredExceptionHandler
GetProcAddress
ReadProcessMemory
GetModuleHandleW
GetTickCount
TerminateProcess
QueryFullProcessImageNameA
GetCurrentThread
TerminateThread
DeleteFileW
CreateThread
GetExitCodeProcess
FindFirstFileW
FindNextFileW
CreateFileW
CreateProcessW
ResumeThread
Sleep
CreateProcessA
GetCurrentThreadId
GetCurrentProcessId
SizeofResource
WriteProcessMemory
SetLastError
GetProcessId
user32
CallNextHookEx
SwitchToThisWindow
SendMessageA
FlashWindowEx
GetCursorPos
DefWindowProcW
DestroyWindow
GetWindowLongW
SetWindowLongW
SetWindowLongPtrW
CreateDialogParamW
EndDialog
DispatchMessageW
TranslateMessage
DialogBoxParamW
GetMessageW
PostThreadMessageW
LoadMenuW
SetWindowPos
GetWindowTextW
IsWindowVisible
ShowWindow
IsWindow
GetWindowTextA
SetWindowTextA
TrackPopupMenu
GetSubMenu
EnumWindows
MessageBoxA
GetWindowLongPtrW
SendMessageW
MessageBoxW
GetWindowThreadProcessId
SetDlgItemTextA
SetDlgItemTextW
GetDlgItemTextA
EnableWindow
CheckDlgButton
KillTimer
GetDlgItem
SetCursor
LoadCursorW
IsDlgButtonChecked
MapWindowPoints
GetDlgCtrlID
RedrawWindow
SetTimer
GetWindowRect
PostMessageW
LoadIconW
GetDlgItemTextW
gdi32
GetStockObject
SetBkMode
CreateFontW
CreateSolidBrush
SetTextColor
advapi32
RegQueryValueExA
RegCreateKeyW
RegCloseKey
RegSetKeyValueW
RegOpenKeyW
RegGetValueW
RegSetKeyValueA
RegGetValueA
RegOpenKeyExA
RegOpenCurrentUser
ole32
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeSecurity
oleaut32
VariantClear
SysStringLen
SysAllocString
SysFreeString
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ