E:\landun\pinyin_agent\workspace\p-f93f0d74ed8a49278e11882bf2562c5a\src\bin\Release_Win32\userNetSchedule.pdb
Static task
static1
Behavioral task
behavioral1
Sample
83578b8d3a2cfbe1440c3d62fca234ce4f5b068d415a844ef76a645815491cee.exe
Resource
win7-20241023-en
General
-
Target
83578b8d3a2cfbe1440c3d62fca234ce4f5b068d415a844ef76a645815491cee
-
Size
5.0MB
-
MD5
b358261e7ed8d73963e27c05cb30b5c1
-
SHA1
8b2a83650f80d6a690cd261cc7b8d424574dc893
-
SHA256
83578b8d3a2cfbe1440c3d62fca234ce4f5b068d415a844ef76a645815491cee
-
SHA512
1a13f1535d3a87ef840ee1a354183e6c87fd43a73adbc06b7752db0af1662b1e685396d4e71640bb758bad28771f87733ec2e12e7c08b04b21bcb1711f148087
-
SSDEEP
98304:HNXSpsfiROazoW5hdtJu4w7Ds6V1hMLpIOc9vequUun5iBji:HApfOazV5hdtJrjxL4Tkn5su
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83578b8d3a2cfbe1440c3d62fca234ce4f5b068d415a844ef76a645815491cee
Files
-
83578b8d3a2cfbe1440c3d62fca234ce4f5b068d415a844ef76a645815491cee.exe windows:6 windows x86 arch:x86
7284ff0892583a8362f6f3457217e883
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
HttpOpenRequestA
HttpQueryInfoA
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
InternetGetConnectedState
HttpSendRequestExW
HttpAddRequestHeadersA
InternetReadFile
HttpAddRequestHeadersW
InternetCanonicalizeUrlW
InternetWriteFile
InternetCrackUrlA
HttpQueryInfoW
InternetConnectA
HttpEndRequestW
InternetSetOptionW
InternetCloseHandle
InternetOpenW
InternetQueryOptionW
kernel32
OpenFileMappingW
GetStartupInfoW
GetLocalTime
GetCurrentThreadId
GetSystemDirectoryW
LocalAlloc
ReleaseMutex
OpenMutexW
GetCurrentDirectoryW
UnlockFileEx
HeapCreate
GetFullPathNameW
WriteFile
VerSetConditionMask
GetTempPathW
CreateMutexW
CreateFileW
GetFileAttributesW
UnmapViewOfFile
HeapValidate
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
CreateFileA
SetFileAttributesW
GetTempFileNameW
GetDiskFreeSpaceExW
GetModuleHandleA
MoveFileExW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
LoadLibraryA
DeleteFileA
LoadLibraryW
HeapCompact
GetDiskFreeSpaceW
CreateFileMappingA
LocalFree
LockFileEx
GetFileSize
SystemTimeToFileTime
FreeLibrary
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
OutputDebugStringA
GetTickCount
FlushFileBuffers
CloseHandle
WaitForSingleObject
GetModuleHandleW
GetProcAddress
GetSystemInfo
Sleep
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
GetCurrentProcessId
SwitchToThread
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
CopyFileW
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
AreFileApisANSI
ReadFile
GetEnvironmentVariableW
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetConsoleCtrlHandler
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
LockFile
SetFilePointer
GetFullPathNameA
UnlockFile
SetEndOfFile
SetLastError
CompareStringW
ReadConsoleA
SetConsoleMode
ConvertFiberToThread
GetTimeFormatW
DeleteFiber
VerifyVersionInfoW
ReleaseSRWLockExclusive
IsDebuggerPresent
GetCurrentProcess
DuplicateHandle
RaiseException
CreateThread
GetCommandLineW
SetPriorityClass
TerminateProcess
OpenProcess
GetExitCodeProcess
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
VirtualFree
VirtualAlloc
VirtualQuery
TlsGetValue
GetProcessId
FileTimeToSystemTime
QueryPerformanceFrequency
SystemTimeToTzSpecificLocalTime
GetFileSizeEx
GetFileInformationByHandle
SetFilePointerEx
TlsSetValue
TlsAlloc
TlsFree
CreateDirectoryW
RemoveDirectoryW
GetVersionExW
GetNativeSystemInfo
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
FindFirstFileExW
CreateEventW
SetEvent
ResetEvent
GetDateFormatW
GetQueuedCompletionStatus
CreateIoCompletionPort
ExitThread
GlobalFree
lstrlenW
CreateProcessW
GetFileTime
OpenEventW
LoadLibraryExW
GetWindowsDirectoryW
WaitForSingleObjectEx
TransactNamedPipe
SetNamedPipeHandleState
WaitNamedPipeW
lstrcatW
lstrcpyW
GetStringTypeW
InitializeSRWLock
GetExitCodeThread
InitOnceBeginInitialize
InitOnceComplete
CompareStringEx
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
GetCPInfo
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
RtlUnwind
ResumeThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetDriveTypeW
SetEnvironmentVariableW
GetFileType
PeekNamedPipe
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
ExitProcess
SetStdHandle
GetTimeZoneInformation
GetStdHandle
user32
SetRectEmpty
wsprintfW
wvsprintfW
GetProcessWindowStation
GetUserObjectInformationW
FindWindowW
GetSystemMetrics
LoadIconW
CreateWindowExW
DestroyWindow
PostMessageW
MessageBoxW
advapi32
CryptReleaseContext
CryptEncrypt
CryptDestroyKey
CryptSetKeyParam
CryptDecrypt
CryptAcquireContextW
GetTokenInformation
OpenProcessToken
RegSetValueExW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
RegOpenKeyW
RegCreateKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
BuildExplicitAccessWithNameW
SetSecurityInfo
SetNamedSecurityInfoW
GetNamedSecurityInfoW
SetEntriesInAclW
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
InitializeAcl
GetSecurityDescriptorSacl
GetLengthSid
AddAccessAllowedAceEx
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
LookupAccountSidW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptImportKey
shell32
SHGetFolderPathW
ShellExecuteW
SHFileOperationW
ShellExecuteExW
CommandLineToArgvW
Shell_NotifyIconW
SHGetKnownFolderPath
ole32
CoCreateGuid
StringFromCLSID
CoTaskMemFree
imm32
ImmDisableIME
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
GetProcessMemoryInfo
shlwapi
PathMatchSpecW
ws2_32
closesocket
WSASetLastError
send
recv
WSAGetLastError
WSACleanup
winmm
timeGetTime
winhttp
WinHttpQueryOption
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
WinHttpWriteData
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpSetOption
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpGetIEProxyConfigForCurrentUser
crypt32
CertFreeCertificateContext
CertDuplicateCertificateContext
CertFindCertificateInStore
CertGetCertificateContextProperty
CertCloseStore
CertOpenStore
CertEnumCertificatesInStore
bcrypt
BCryptGenRandom
Exports
Exports
GetHandleVerifier
Sections
.text Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 916KB - Virtual size: 915KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 101KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 266KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE