Behavioral task
behavioral1
Sample
打开沐言脚本官网地址.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
打开沐言脚本官网地址.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
沐言脚本9-30.exe
Resource
win7-20240903-en
General
-
Target
108664291435a62038bb7c3c69d78a85c46215835325a30ef85527ccfaf16acc
-
Size
11.2MB
-
MD5
e2acd1cc87b5af820402d3b9f87d27ef
-
SHA1
b3b65bcdd5435046360acc1b3ae4737ca1d9cb4f
-
SHA256
108664291435a62038bb7c3c69d78a85c46215835325a30ef85527ccfaf16acc
-
SHA512
6e7197d4a98f019dc608a6d7d0a970ac06c73db2a3673ce24f54d58468bc5854404d223f292a5b11b23808c3209ebea2b8d930258aa40f1afa25a1fc14910ae9
-
SSDEEP
196608:bkZXbTcUkMwV+IwmYuivLNNSDeIm7LVq2L1TY/C0CQZBhZyqHmLNui0Z:bgXbTcLbQIwpu2Pc2Lm/VRZwqauH
Malware Config
Signatures
-
resource yara_rule static1/unpack001/沐言脚本9-30.exe vmprotect
Files
-
108664291435a62038bb7c3c69d78a85c46215835325a30ef85527ccfaf16acc.zip
-
常见问题解答指南.txt
-
打开沐言脚本官网地址.url
-
斜谷诡兵阵设计器点位图.jpg.jpg
-
沐言脚本9-30.exe.exe windows:4 windows x86 arch:x86
b81079f03aee7551cd3bdd724287ead5
Code Sign
0f:2a:d6:44:4f:c4:dd:8b:48:d7:07:a1:94:03:11:4eCertificate
IssuerCN=Symantec Time Stamping Services Signer - G4,ST=Hubei,C=China,1.2.840.113549.1.9.1=#1300Not Before13/03/2021, 10:16Not After12/03/2022, 16:00SubjectCN=福州创意嘉和软件有限公司07Certificate
IssuerCN=Starfield Root Certificate Authority - G2,O=Starfield Technologies\, Inc.,L=Scottsdale,ST=Arizona,C=USNot Before03/05/2011, 07:00Not After03/05/2031, 07:00SubjectCN=Starfield Secure Certificate Authority - G2,OU=http://certs.starfieldtech.com/repository/,O=Starfield Technologies\, Inc.,L=Scottsdale,ST=Arizona,C=USKey Usages
KeyUsageCertSign
KeyUsageCRLSign
0b:e6:3a:c9:92:ef:67:baCertificate
IssuerCN=Starfield Secure Certificate Authority - G2,OU=http://certs.starfieldtech.com/repository/,O=Starfield Technologies\, Inc.,L=Scottsdale,ST=Arizona,C=USNot Before09/09/2020, 07:00Not After09/09/2025, 07:00SubjectCN=Starfield Timestamp Authority - G2,O=Starfield Technologies\, LLC,L=Scottsdale,ST=Arizona,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
ce:cc:d8:f7:fd:65:43:95:72:74:53:f9:36:b5:5c:4f:e2:a6:dd:2aSigner
Actual PE Digestce:cc:d8:f7:fd:65:43:95:72:74:53:f9:36:b5:5c:4f:e2:a6:dd:2aDigest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord807
msvcrt
__getmainargs
kernel32
GlobalSize
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
GetSystemMetrics
MessageBoxA
gdi32
RoundRect
advapi32
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
comctl32
ImageList_GetImageInfo
ole32
CLSIDFromString
oleaut32
SysAllocStringByteLen
urlmon
URLDownloadToFileA
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
winmm
PlaySoundA
wininet
DeleteUrlCacheEntry
shlwapi
SHDeleteKeyA
ws2_32
gethostbyname
rpcrt4
RpcStringFreeA
imagehlp
MakeSureDirectoryPathExists
dinput8
DirectInput8Create
msimg32
GradientFill
uxtheme
SetThemeAppProperties
comdlg32
GetOpenFileNameA
olepro32
ord251
Exports
Exports
?interfaceMap@CCustomControlSite@@1UAFX_INTERFACEMAP@@B
Sections
.text Size: 744KB - Virtual size: 740KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 440KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 376KB - Virtual size: 373KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ