D:\code\pinyin-pc\Basic\Outputs\Release\IMEBroker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c3e67c28584c95ce940ba413f8b7e5013a06343bbf89005ddffbbeb4dc2109eb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c3e67c28584c95ce940ba413f8b7e5013a06343bbf89005ddffbbeb4dc2109eb.exe
Resource
win10v2004-20241007-en
General
-
Target
c3e67c28584c95ce940ba413f8b7e5013a06343bbf89005ddffbbeb4dc2109eb
-
Size
184KB
-
MD5
f02a2e869e66446dde022dcb6630a812
-
SHA1
3596868d7643c1672715155014e47b0abc217785
-
SHA256
c3e67c28584c95ce940ba413f8b7e5013a06343bbf89005ddffbbeb4dc2109eb
-
SHA512
4b5f5947df5179c37f016e76dd2df2736bb3fc50ae823dc944774e2ebc79be756b4d4fc4180472e71b06c229723a931ced32c870172aaa89146063ac97e78511
-
SSDEEP
3072:y6cn/KSQ+slqdzAIuIv+lPuJ/45qPTbEqjSk1:yjn6tIuIvF/q8EqjL1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3e67c28584c95ce940ba413f8b7e5013a06343bbf89005ddffbbeb4dc2109eb
Files
-
c3e67c28584c95ce940ba413f8b7e5013a06343bbf89005ddffbbeb4dc2109eb.exe windows:5 windows x86 arch:x86
0b2547ce366dcd74947edfb7e0286c80
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
imm32
ImmDisableIME
advapi32
RegOpenKeyExW
InitializeSecurityDescriptor
AllocateAndInitializeSid
SetEntriesInAclW
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
RegQueryValueExW
RegCloseKey
user32
GetMessageW
TranslateMessage
DispatchMessageW
LoadCursorW
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcW
CharNextW
IsWindow
GetWindowLongW
SetWindowLongW
KillTimer
LoadImageW
GetClassInfoExW
PostMessageW
DestroyWindow
RegisterClassExW
FindWindowW
CreateWindowExW
SetWindowTextW
FindWindowExW
SetTimer
SendMessageTimeoutW
shell32
SHGetFolderPathW
ord165
Shell_NotifyIconW
kernel32
GetConsoleMode
GetConsoleCP
HeapReAlloc
LoadLibraryW
GetProcAddress
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameW
GetCurrentProcessId
OutputDebugStringW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
GetModuleHandleExW
SetLastError
FreeLibrary
GetLastError
CreateEventW
CloseHandle
WaitForSingleObject
SetEvent
GetPrivateProfileStringW
GetVersionExW
LocalFree
LocalAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
CreateFileW
SetNamedPipeHandleState
GetOverlappedResult
WriteFile
ReadFile
RemoveVectoredExceptionHandler
TerminateProcess
GetCurrentProcess
AddVectoredExceptionHandler
GetCommandLineW
GlobalMemoryStatusEx
Sleep
CreateProcessW
GetModuleHandleW
CreateMutexW
OpenMutexW
InterlockedCompareExchange
LoadLibraryExW
RaiseException
DecodePointer
GetSystemTimeAsFileTime
GetPrivateProfileIntW
ProcessIdToSessionId
WideCharToMultiByte
MultiByteToWideChar
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetFileType
GetStdHandle
GetProcessHeap
FlushFileBuffers
WriteConsoleW
SetStdHandle
HeapSize
ExitProcess
LCMapStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetStringTypeW
EncodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
SetFilePointerEx
shlwapi
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
crypt32
CertGetNameStringW
CertNameToStrW
imagehlp
ImageGetCertificateHeader
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ