f:\外壳10.13\tnet2\release\Dotfuscated\3dnet.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e7580d57b48d790979639482d1be94a0c21136d0fb7621b051da80238dc6bb2dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7580d57b48d790979639482d1be94a0c21136d0fb7621b051da80238dc6bb2dN.exe
Resource
win10v2004-20240802-en
General
-
Target
e7580d57b48d790979639482d1be94a0c21136d0fb7621b051da80238dc6bb2dN
-
Size
460KB
-
MD5
852c91cab44269d891ec52457b5af6d0
-
SHA1
6fc6073d12d82a31d1effd75c13b017a4b3f09ff
-
SHA256
e7580d57b48d790979639482d1be94a0c21136d0fb7621b051da80238dc6bb2d
-
SHA512
da7cfb0df75c60d742f59c12a2566ad71fbdd742f4a81da482cd7e522c5c3a4a85423552ef0b80995f551f68e8084a8cd915bfa025dbb551f4eb09fd715bfbfd
-
SSDEEP
6144:p9rQwfnXo5/e+GdNQeoqqPbLBX1zB1nwFhGlmlusb2peGARH8FukXFd5Ii+:TQwfXoo+GJJ+bLBdQ4QosSNxii+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e7580d57b48d790979639482d1be94a0c21136d0fb7621b051da80238dc6bb2dN
Files
-
e7580d57b48d790979639482d1be94a0c21136d0fb7621b051da80238dc6bb2dN.exe windows:4 windows x86 arch:x86
9df6c16a35c9b9e932de92388ac37fde
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr80
??3@YAXPAX@Z
free
malloc
fclose
fread
fopen
_strnicmp
__FrameUnwindFilter
__p__fmode
__p__commode
_configthreadlocale
__wgetmainargs
_XcptFilter
__set_app_type
_amsg_exit
_cexit
??2@YAPAXI@Z
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_encode_pointer
__iob_func
kernel32
Sleep
lstrcpyA
SizeofResource
LockResource
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
FindResourceW
GetTickCount
CloseHandle
OpenProcess
GetCurrentProcessId
CreateThread
ReleaseSemaphore
CreateSemaphoreA
GetLocalTime
WaitForSingleObject
LoadResource
QueryPerformanceCounter
lstrcatA
lstrcpynA
DeviceIoControl
CreateFileA
GetSystemDirectoryA
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleHandleW
LoadLibraryExA
GetProcAddress
GetLastError
GlobalAlloc
LocalLock
GlobalUnlock
LocalFree
GetLogicalDriveStringsA
GetDiskFreeSpaceA
GetDriveTypeA
SetErrorMode
lstrlenA
msvcm80
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
__setusermatherr_m
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
advapi32
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
user32
PostQuitMessage
GetMessageW
wsprintfA
MessageBoxA
RegisterDeviceNotificationW
TranslateMessage
ShowWindow
CreateWindowExA
RegisterClassA
LoadCursorW
LoadIconW
DefWindowProcW
DispatchMessageW
UpdateWindow
gdi32
GetStockObject
mscoree
_CorExeMain
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ