e:\czf\work\ToolsDevelop\通用工具\MakeISO_Tool\NDIS_DRIVER_INSTALL - 2012(xzm modify)\Bin\RlMTSDF800_Install\FI_Eject.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a659de857094dc8b6520ba738c1073b8c947a584ad557eea61bea16a6cbf6f80N.exe
Resource
win7-20240708-en
General
-
Target
a659de857094dc8b6520ba738c1073b8c947a584ad557eea61bea16a6cbf6f80N.exe
-
Size
414KB
-
MD5
3007a4eae34523d7584389ab62f52b00
-
SHA1
1f3016e8f7e99d49b864adaf351873c337c2c670
-
SHA256
a659de857094dc8b6520ba738c1073b8c947a584ad557eea61bea16a6cbf6f80
-
SHA512
00944487300d8ff098319714f5345d39633017712e914529d219755d0538c3fa4969c31357745f6577a6786781eed563af96444227e74554162a576ca9212818
-
SSDEEP
6144:cNe91TWRDStNideo/7bYHzvLi/OHUBbmAkrhq9bt8BV+UdvrEFp7hKEH:Ge9VNioU7bYHjO/OHUmj0bt8BjvrEH7B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a659de857094dc8b6520ba738c1073b8c947a584ad557eea61bea16a6cbf6f80N.exe
Files
-
a659de857094dc8b6520ba738c1073b8c947a584ad557eea61bea16a6cbf6f80N.exe.exe windows:5 windows x86 arch:x86
ae85381adfe87ea5935ab35a07986da1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
HeapCreate
VirtualFree
VirtualAlloc
GetModuleFileNameA
LCMapStringA
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GlobalFlags
GetModuleHandleA
WritePrivateProfileStringW
lstrlenA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
InterlockedDecrement
InterlockedIncrement
GlobalAddAtomW
GlobalFindAtomW
LoadLibraryA
GetVersionExA
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
InterlockedExchange
lstrcmpW
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenW
Process32NextW
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
LocalFree
FormatMessageW
CreateThread
ReleaseSemaphore
CreateSemaphoreW
WaitForSingleObject
WideCharToMultiByte
GetACP
HeapFree
GetProcessHeap
HeapAlloc
GetTickCount
Sleep
FindClose
FindFirstFileW
GetProcAddress
FreeLibrary
LoadLibraryW
GetVersionExW
GetModuleFileNameW
SetEvent
CreateEventW
WaitForMultipleObjects
OutputDebugStringW
GetLocalTime
DeviceIoControl
CreateFileW
CloseHandle
GetLastError
GetCurrentProcess
GetCommandLineW
GetModuleHandleW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
GetCPInfo
InterlockedCompareExchange
user32
DestroyMenu
ShowWindow
SetWindowTextW
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMessageW
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
GetWindowThreadProcessId
IsWindowEnabled
GetDC
GetSysColorBrush
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
UnregisterDeviceNotification
IsWindow
PostMessageW
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
EnableWindow
SetForegroundWindow
GetClientRect
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
GetParent
LoadCursorW
RegisterDeviceNotificationW
IsWindowVisible
EnumChildWindows
GetClassNameW
SendMessageW
EnumWindows
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
GetWindow
GetSystemMetrics
GetWindowRect
GetWindowPlacement
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
GetWindowLongW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
ReleaseDC
gdi32
GetStockObject
DeleteDC
SetMapMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegDeleteKeyW
RegQueryValueW
RegCreateKeyExW
CreateProcessAsUserW
SetServiceStatus
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
DeleteService
CreateServiceW
EnumDependentServicesW
ControlService
ChangeServiceConfigW
QueryServiceStatusEx
StartServiceW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegSetValueExW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegEnumKeyW
shlwapi
PathFindExtensionW
PathFindFileNameW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ