H:\白kConsoleApplication1\x64\Debug\白kConsoleApplication1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae74cae9f7949ea19ea6c891726755e76f15fcc5eef5107ad70dc9f7f797456b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae74cae9f7949ea19ea6c891726755e76f15fcc5eef5107ad70dc9f7f797456b.exe
Resource
win10v2004-20240802-en
General
-
Target
ae74cae9f7949ea19ea6c891726755e76f15fcc5eef5107ad70dc9f7f797456b
-
Size
2.2MB
-
MD5
8697cd1ff14060f9ae30865c5539c5df
-
SHA1
1a76db7782af48e882c933156cba179882ffd580
-
SHA256
ae74cae9f7949ea19ea6c891726755e76f15fcc5eef5107ad70dc9f7f797456b
-
SHA512
e0cc09823f450794e7d5bbf40cce7bf8476a3da591f28102dd253f5bf06fe88f74cd1707cf0bfa912c32af91dc7ba64c8f8503dd92176a17b2935b62b8aa6b65
-
SSDEEP
24576:M25Jj/b0QGaUiB1NM4LPl0L4aV8G705GU3z1Y3Ri5yJHWkl:MQJj/b0sNM4LPlHepm5WHx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ae74cae9f7949ea19ea6c891726755e76f15fcc5eef5107ad70dc9f7f797456b
Files
-
ae74cae9f7949ea19ea6c891726755e76f15fcc5eef5107ad70dc9f7f797456b.exe windows:6 windows x64 arch:x64
17684cb3fed1c6455959f1af5aef09cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
OpenProcess
GetLocalTime
GetTickCount
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
VirtualFreeEx
GetModuleFileNameA
GetModuleHandleA
LoadResource
LockResource
SizeofResource
LocalAlloc
LocalFree
lstrcpyA
FindResourceA
MultiByteToWideChar
CreateProcessA
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExA
VirtualQuery
SetEndOfFile
CreateFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
TerminateProcess
GetCurrentProcess
Sleep
GetLastError
CloseHandle
GetEnvironmentVariableA
IsBadReadPtr
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualFree
VirtualProtect
VirtualAlloc
GetNativeSystemInfo
GetProcessHeap
HeapFree
HeapAlloc
EnumDateFormatsA
SetLastError
GetTimeZoneInformation
DeleteFileW
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
WriteConsoleW
OutputDebugStringW
GetFileType
RtlUnwind
HeapQueryInformation
HeapReAlloc
GetCurrentThread
GetCommandLineW
GetCommandLineA
WriteFile
GetStdHandle
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
FormatMessageA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
WideCharToMultiByte
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
RtlPcToFileHeader
RaiseException
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
HeapSize
HeapValidate
GetSystemInfo
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
user32
IsWindowVisible
GetWindowTextA
FindWindowExA
ShowWindow
GetClassNameA
GetWindowThreadProcessId
SendMessageW
PostMessageA
EnumWindows
PostMessageW
GetWindow
advapi32
ConvertStringSidToSidW
OpenServiceW
OpenSCManagerW
ControlService
CloseServiceHandle
RegSetValueExW
RegCreateKeyExW
LookupPrivilegeValueW
SetTokenInformation
ImpersonateLoggedOnUser
GetTokenInformation
GetLengthSid
FreeSid
DuplicateTokenEx
AllocateLocallyUniqueId
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
shell32
SHGetFolderPathA
ole32
CoCreateInstance
StringFromGUID2
CoCreateGuid
CoInitializeSecurity
CoInitializeEx
CoUninitialize
oleaut32
SysFreeString
SysAllocString
SetErrorInfo
VariantChangeType
VariantInit
CreateErrorInfo
GetErrorInfo
VariantClear
wininet
InternetOpenUrlA
InternetReadFile
HttpQueryInfoA
InternetOpenA
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
rstrtmgr
RmRegisterResources
RmGetList
RmShutdown
RmEndSession
RmStartSession
Exports
Exports
K360
Sections
.textbss Size: - Virtual size: 750KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 512B - Virtual size: 370B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 337B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 1024B - Virtual size: 546B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 223KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ