F:\svn\clean\ShareLib\aliyunlog\Release\AliyunWrapExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d53437bc48028c79eb6e93a0ff19907accb783aab8beb1cf52c712347d56c20eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d53437bc48028c79eb6e93a0ff19907accb783aab8beb1cf52c712347d56c20eN.exe
Resource
win10v2004-20240802-en
General
-
Target
d53437bc48028c79eb6e93a0ff19907accb783aab8beb1cf52c712347d56c20eN
-
Size
1.3MB
-
MD5
642663b21262017375b6d9938c03bbf0
-
SHA1
3a02c5f7e0f89203e292eae293e5b569f34cf72e
-
SHA256
d53437bc48028c79eb6e93a0ff19907accb783aab8beb1cf52c712347d56c20e
-
SHA512
f4f1841bc42adba6b07c86155e472a775be33d8c5919bbce40803e4d14c001c8f2593c161759f4bc4f95b4f551c6c2b4a9dc6ee57f54cd2ba612ef6cc103b762
-
SSDEEP
24576:dqJIsOKETuffqmZEt9C8IGW7dDRF1Kl/7pK6QJJcg4z:sIsOvTuqUEtlIVDR7KlDpn8X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d53437bc48028c79eb6e93a0ff19907accb783aab8beb1cf52c712347d56c20eN
Files
-
d53437bc48028c79eb6e93a0ff19907accb783aab8beb1cf52c712347d56c20eN.exe windows:5 windows x86 arch:x86
57d8bcf1a882f562558a929122e326b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
GetConsoleOutputCP
FlushFileBuffers
WaitForMultipleObjects
SetCurrentDirectoryW
CreateFileW
WriteConsoleW
CloseHandle
GetModuleFileNameW
GetPrivateProfileStringW
WritePrivateProfileStringW
DeleteFileW
ReadFile
WriteFile
SetEvent
WaitForSingleObject
OpenEventW
CreateEventW
GetLastError
CreateMutexW
GetCurrentProcess
TerminateProcess
GetFileAttributesW
GetPrivateProfileIntW
GetLocalTime
GlobalMemoryStatusEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
HeapFree
HeapAlloc
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
ReleaseMutex
aliyunwrap
?SendLogToCloud@@YA_NABV?$vector@U?$pair@PA_WPA_W@std@@V?$allocator@U?$pair@PA_WPA_W@std@@@2@@std@@@Z
urlmon
URLDownloadToFileW
iphlpapi
GetAdaptersInfo
rpcrt4
UuidCreate
advapi32
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
LookupAccountNameW
GetUserNameW
RegCloseKey
RegQueryValueExW
RegOpenKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSidSubAuthority
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE