E:\辅助压缩包备份\登录器\loader_su_cn\x64\Release\C_.pdb
Static task
static1
Behavioral task
behavioral1
Sample
93f48c35e295964abe5b7fc470ae3602a22163f67ad07527fc32bb73c965484f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
93f48c35e295964abe5b7fc470ae3602a22163f67ad07527fc32bb73c965484f.exe
Resource
win10v2004-20240802-en
General
-
Target
93f48c35e295964abe5b7fc470ae3602a22163f67ad07527fc32bb73c965484f
-
Size
79KB
-
MD5
4d3d3944050462807c7f56fe868f2ec6
-
SHA1
26bdf6c90415f08c1bbaf41cac2e301ee550d300
-
SHA256
93f48c35e295964abe5b7fc470ae3602a22163f67ad07527fc32bb73c965484f
-
SHA512
727424fa3d52eaa497932f089089732d0b9f574604f3a9e0b7412fb5bcdb816e5ce1e8aacf2ba8272050326caaa82f044d17f9f5d5a6a421f0ef5733709599b7
-
SSDEEP
1536:yA02ta65bDT6APi2oI4b1ks8uExwTWcX0/L:yA04zxyIiZI4ms8u0e0D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93f48c35e295964abe5b7fc470ae3602a22163f67ad07527fc32bb73c965484f
Files
-
93f48c35e295964abe5b7fc470ae3602a22163f67ad07527fc32bb73c965484f.exe windows:6 windows x64 arch:x64
f63293398458a6fb30a6883d69342d29
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SetThreadPriority
Sleep
CloseHandle
FreeConsole
GetCurrentConsoleFontEx
ExitProcess
SetConsoleTitleW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
SetCurrentConsoleFontEx
CreateFileW
DeleteFileW
WriteFile
DeviceIoControl
Wow64DisableWow64FsRedirection
GetStdHandle
GetCurrentProcess
SetConsoleTextAttribute
GetModuleFileNameW
Wow64RevertWow64FsRedirection
GetModuleHandleA
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
SetPriorityClass
GetComputerNameA
GetConsoleScreenBufferInfo
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
GetSystemTimeAsFileTime
InitializeSListHead
user32
MessageBoxA
GetWindowThreadProcessId
GetAsyncKeyState
FindWindowA
advapi32
RegCloseKey
RegSetKeyValueW
RegCreateKeyW
shell32
ShellExecuteA
SHChangeNotify
ws2_32
recv
connect
closesocket
WSAStartup
inet_addr
send
socket
htons
msvcp140
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
?width@ios_base@std@@QEAA_J_J@Z
?width@ios_base@std@@QEBA_JXZ
?flags@ios_base@std@@QEBAHXZ
?good@ios_base@std@@QEBA_NXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
??Bid@locale@std@@QEAA_KXZ
?id@?$ctype@D@std@@2V0locale@2@A
?_Xout_of_range@std@@YAXPEBD@Z
?uncaught_exception@std@@YA_NXZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
?widen@?$ctype@_W@std@@QEBA_WD@Z
?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z
?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z
?tie@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_ostream@_WU?$char_traits@_W@std@@@2@XZ
?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ
?fill@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WXZ
?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z
?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z
?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z
?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ
?id@?$ctype@_W@std@@2V0locale@2@A
?_Xlength_error@std@@YAXPEBD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlInitUnicodeString
winhttp
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
WinHttpCrackUrl
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception
__current_exception_context
__C_specific_handler
memset
memmove
memcmp
__std_exception_destroy
__std_exception_copy
__std_terminate
strstr
_CxxThrowException
memchr
memcpy
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
_set_fmode
__acrt_iob_func
__stdio_common_vfprintf
__p__commode
rewind
api-ms-win-crt-string-l1-1-0
wcscpy_s
api-ms-win-crt-utility-l1-1-0
srand
rand
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_c_exit
_register_onexit_function
__p__pgmptr
_invalid_parameter_noinfo_noreturn
__p___argv
__p___argc
_exit
_initterm_e
_initterm
_get_initial_narrow_environment
exit
_set_app_type
_seh_filter_exe
terminate
_cexit
_crt_atexit
system
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
malloc
_callnewh
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ