h:\Development\修改usb驱动即插即用\ETUsbIfr4P_6.8.8_CHS\ETTUninst\Release\ETTUninst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
46cc8e2423218f9483651544587324669295df34d8e812de347f2cd6cba238d8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46cc8e2423218f9483651544587324669295df34d8e812de347f2cd6cba238d8N.exe
Resource
win10v2004-20241007-en
General
-
Target
46cc8e2423218f9483651544587324669295df34d8e812de347f2cd6cba238d8N
-
Size
464KB
-
MD5
1d1ac49c1a2e3c2c95182107b0579580
-
SHA1
0fd7df6e1b9f2f6b49a11f0d2493caed50ccf855
-
SHA256
46cc8e2423218f9483651544587324669295df34d8e812de347f2cd6cba238d8
-
SHA512
e1d57f3b46d328e0905933caae264c33d0d01f9afcaac2f3c583cdfb120753a442b433e3b0cb5152e235dc7c892e67feefaf793f0c4cfaadd9f11fcafc41d231
-
SSDEEP
12288:VKffldqK2xY8+484wQR0OOGUcWj5i1oXD7hzAaqd/g/J/vkEid0Cxz:VKfiLUI1CD9qd/g/J/cLz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46cc8e2423218f9483651544587324669295df34d8e812de347f2cd6cba238d8N
Files
-
46cc8e2423218f9483651544587324669295df34d8e812de347f2cd6cba238d8N.exe windows:4 windows x86 arch:x86
36dcf2d917cbd0f7a38649d7a9ec09bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupOpenInfFileA
SetupOpenFileQueue
SetupInitDefaultQueueCallback
SetupCloseFileQueue
SetupCloseInfFile
SetupInstallFilesFromInfSectionA
SetupCommitFileQueueA
SetupInstallFromInfSectionA
SetupTermDefaultQueueCallback
SetupDefaultQueueCallbackA
SetupDiRemoveDevice
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
newdev
UpdateDriverForPlugAndPlayDevicesA
kernel32
VirtualProtect
lstrcmpW
lstrcatA
GlobalFindAtomA
GlobalGetAtomNameA
FreeResource
WritePrivateProfileStringA
InterlockedIncrement
InterlockedDecrement
GlobalFlags
RaiseException
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
ReadFile
SetFilePointer
FlushFileBuffers
GetCurrentProcess
FindResourceExA
GetCPInfo
GetOEMCP
SetErrorMode
HeapAlloc
HeapFree
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
TerminateProcess
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GlobalAddAtomA
SetLastError
GlobalFree
MulDiv
GlobalUnlock
lstrcpynA
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
RemoveDirectoryA
GetWindowsDirectoryA
DeleteFileA
GetSystemDirectoryA
LocalAlloc
Sleep
FindResourceA
LoadResource
LockResource
SizeofResource
FormatMessageA
LocalFree
GetModuleFileNameA
lstrcmpA
CreateFileA
WriteFile
CloseHandle
WinExec
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
EnterCriticalSection
user32
GetSysColorBrush
LoadCursorA
DestroyMenu
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsWindow
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
CopyRect
PtInRect
GetWindow
SetWindowPos
ShowWindow
GetCapture
SetActiveWindow
GetAsyncKeyState
SetFocus
GetWindowRect
GetDlgItem
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
MessageBoxA
GetParent
PostMessageA
EnableWindow
SendMessageA
wsprintfA
ValidateRect
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
GetSysColor
EndPaint
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
PostQuitMessage
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ScreenToClient
ClientToScreen
BeginPaint
ReleaseDC
GetDC
MapDialogRect
gdi32
EnumFontFamiliesExA
GetClipBox
SetTextColor
DeleteObject
CreateFontIndirectA
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetStockObject
SetMapMode
GetObjectA
PtVisible
RectVisible
TextOutA
GetDeviceCaps
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
advapi32
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
PropertySheetA
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
oleacc
CreateStdAccessibleObject
LresultFromObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
>E� Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE