D:\jenkins\workspace\yxqxunyou_new\output\yxqxunyou.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f41236ab5ceffc5379fcf444de358cbc6f67beb31d0e0fd3f7ed0f501eb740ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f41236ab5ceffc5379fcf444de358cbc6f67beb31d0e0fd3f7ed0f501eb740ff.exe
Resource
win10v2004-20240802-en
General
-
Target
f41236ab5ceffc5379fcf444de358cbc6f67beb31d0e0fd3f7ed0f501eb740ff
-
Size
2.6MB
-
MD5
acf6755c91445fa129fef20f5f065d18
-
SHA1
fc90769779be5a3fb0de21d9780de191fe8c4246
-
SHA256
f41236ab5ceffc5379fcf444de358cbc6f67beb31d0e0fd3f7ed0f501eb740ff
-
SHA512
9dc1c72d9b9a69c481a5810325b4cd2c8dd27561381533e6ef844cef5b63b68f3370a86dc58c95ee2c62a4f2d3a231a0cff1c36b1b1c5b954ab8e48ade0258d1
-
SSDEEP
49152:yss1mW+5gnAux9ofbJJ1zv9LNPt6nI/TAUsNZVKcUgm:yss1mWUgshr9j6nI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f41236ab5ceffc5379fcf444de358cbc6f67beb31d0e0fd3f7ed0f501eb740ff
Files
-
f41236ab5ceffc5379fcf444de358cbc6f67beb31d0e0fd3f7ed0f501eb740ff.exe windows:5 windows x86 arch:x86
affa1d0c8e44bd60a21d192f5f43464d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wldap32
ord26
ord27
ord117
ord167
ord142
ord79
ord133
ord147
ord301
ord208
ord73
ord216
ord14
ord46
ord219
ord127
ord145
ord41
crypt32
CertDuplicateCertificateContext
CertFindCertificateInStore
CertOpenStore
CertOpenSystemStoreA
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertGetCertificateContextProperty
kernel32
CreateFileW
CloseHandle
GetFileSize
FindFirstFileW
FindNextFileW
FindClose
GetTempPathA
DeleteFileW
lstrcmpiW
GetModuleFileNameA
SetLastError
WriteFile
MultiByteToWideChar
SetFilePointerEx
WideCharToMultiByte
GetLocalTime
LoadLibraryA
GetProcAddress
OpenEventA
WaitForSingleObject
OpenFileMappingW
UnmapViewOfFile
SetEvent
GetCurrentProcessId
CreateFileMappingW
CreateEventA
MapViewOfFile
CreateDirectoryW
GetCurrentProcess
WaitForMultipleObjects
GetTempPathW
GetCurrentThreadId
OpenProcess
CreateToolhelp32Snapshot
Sleep
GetTickCount64
Process32NextW
Process32FirstW
CreateProcessW
GetModuleHandleW
CopyFileW
CreateEventW
LoadLibraryW
SetUnhandledExceptionFilter
GetStdHandle
GetWindowsDirectoryA
FindFirstFileExW
GetComputerNameA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
RtlCaptureStackBackTrace
GetSystemTimeAsFileTime
SleepEx
VerSetConditionMask
QueryPerformanceFrequency
GetSystemDirectoryW
VerifyVersionInfoW
QueryPerformanceCounter
GetTickCount
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
GetModuleFileNameW
PeekNamedPipe
GetEnvironmentVariableW
GetConsoleMode
ReadConsoleA
ReadConsoleW
SetConsoleMode
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
FormatMessageW
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
GetSystemTime
SystemTimeToFileTime
CreateProcessA
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
OutputDebugStringA
ReadFile
FormatMessageA
FreeLibrary
DeleteCriticalSection
DecodePointer
RaiseException
GetLastError
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
GetDriveTypeW
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SignalObjectAndWait
CreateTimerQueue
SwitchToThread
InterlockedExchange
InterlockedCompareExchange
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
ResetEvent
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
InitializeCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetFileType
HeapSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetProcessHeap
GetTimeZoneInformation
SetEndOfFile
WriteConsoleW
GetFullPathNameW
GetCurrentDirectoryW
CreatePipe
GetExitCodeProcess
FlushFileBuffers
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
GetCommandLineW
GetCommandLineA
HeapReAlloc
HeapFree
HeapAlloc
ExitProcess
GetExitCodeThread
GetCurrentThread
ExitThread
GetFileAttributesExW
SetConsoleCtrlHandler
GetConsoleCP
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
EncodePointer
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
user32
GetPropW
GetProcessWindowStation
MessageBoxW
EnumWindows
SendMessageW
GetUserObjectInformationW
advapi32
CryptEnumProvidersW
CryptSignHashW
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptGenRandom
ReportEventW
RegisterEventSourceW
DeregisterEventSource
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
CryptDestroyKey
CryptAcquireContextW
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptReleaseContext
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
SHCreateDirectoryExW
shlwapi
PathFileExistsW
StrCmpIW
PathIsDirectoryW
wininet
InternetOpenW
HttpQueryInfoW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
iphlpapi
GetAdaptersInfo
GetIpForwardTable
ws2_32
connect
htons
inet_addr
WSAStartup
WSACleanup
sendto
recvfrom
getnameinfo
ntohl
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSAIoctl
WSASetLastError
setsockopt
ntohs
getsockopt
getsockname
getpeername
shutdown
bind
WSAGetLastError
send
recv
gethostbyname
gethostname
getaddrinfo
inet_ntoa
freeaddrinfo
closesocket
select
socket
psapi
GetModuleFileNameExW
dbghelp
MiniDumpWriteDump
SymSetOptions
SymCleanup
SymInitialize
SymFromAddr
UnDecorateSymbolName
ole32
CoCreateGuid
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 571KB - Virtual size: 571KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ