E:\jenkins\workspace\ci.wangwang.manual\feature_dev_9.12.09\SourceCode\IMClient-RV\symbol\Release\AliIM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
40ca47afc49da60c79c7dab1f96d269ac91aae721ea7091215f22f71dc269ef7N.exe
Resource
win7-20240903-en
General
-
Target
40ca47afc49da60c79c7dab1f96d269ac91aae721ea7091215f22f71dc269ef7N.exe
-
Size
374KB
-
MD5
23c2947d38ecee065aacf43a7bae9eb0
-
SHA1
f6dcb82f06f5fbca9dc2fa44e749ebc78615555c
-
SHA256
40ca47afc49da60c79c7dab1f96d269ac91aae721ea7091215f22f71dc269ef7
-
SHA512
b717ef215391c1926c95d778fc700628f46f7a30809de86c6a1fff883e99022cb28f7fffa566124e1ac57d5e02577990ffcb4ca0bbf44d4c1b104bfe40cd1994
-
SSDEEP
6144:Prs/H5J9OYDVgocPOv6MXP8A4OVoKZtj6d0On/:PAP5JYYDqHY6MXPXhT03
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40ca47afc49da60c79c7dab1f96d269ac91aae721ea7091215f22f71dc269ef7N.exe
Files
-
40ca47afc49da60c79c7dab1f96d269ac91aae721ea7091215f22f71dc269ef7N.exe.exe windows:5 windows x86 arch:x86
5b8655c0216e61b41f19c40ef75ad0b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CopyFileW
DeleteFileW
GetFileAttributesW
GetPrivateProfileStringW
LocalAlloc
lstrcmpA
CreateFileW
GetFileSize
ReadFile
CloseHandle
WriteFile
SetFilePointer
FlushFileBuffers
GetLocalTime
LocalFree
GetPrivateProfileIntW
WritePrivateProfileStringW
CreateProcessW
WaitForSingleObject
Sleep
LoadLibraryW
FreeLibrary
SetCurrentDirectoryW
GetModuleFileNameW
LoadLibraryExW
SetStdHandle
VerifyVersionInfoW
VerSetConditionMask
DeleteCriticalSection
GetProcAddress
GetStringTypeW
GetConsoleMode
GetConsoleCP
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
RaiseException
GetModuleHandleW
FindResourceExW
FindResourceW
GetFileType
WriteConsoleW
SetHandleCount
GetEnvironmentStringsW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
lstrlenA
GetLastError
WideCharToMultiByte
SetDllDirectoryW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
ExitProcess
GetStdHandle
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringW
FreeEnvironmentStringsW
user32
MessageBoxW
advapi32
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHGetFolderPathW
ShellExecuteExW
ole32
CoInitialize
shlwapi
PathFileExistsW
wintrust
WinVerifyTrust
crypt32
CryptMsgGetParam
CryptDecodeObject
CertFindCertificateInStore
CertGetNameStringW
CertFreeCertificateContext
CertCloseStore
CryptQueryObject
CryptMsgClose
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE