C:\Users\2495\Desktop\PESP\V652\fc2.0\ESP本体\vc12\Release\IJPLMUI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ecee44507b0d039f9fdeea961cb3e5d495d0320648d7197118772299d07906c9.exe
Resource
win7-20240903-en
General
-
Target
ecee44507b0d039f9fdeea961cb3e5d495d0320648d7197118772299d07906c9
-
Size
473KB
-
MD5
0186215726f9f676ad302f0c6ddba265
-
SHA1
0d6774d3ffb46b08bbfad38bbe17ff14fd1f9c75
-
SHA256
ecee44507b0d039f9fdeea961cb3e5d495d0320648d7197118772299d07906c9
-
SHA512
dd1917381020f542c4525df78fd3aae49867b8f64c2c9e64e6a107f47a439f653075d7eba0adfef07aa2e7acd4ae6c4b55137c305867a33afb152e191e777f50
-
SSDEEP
3072:HNagJ+8isxdiYwBiGxJMfb2nrL7nNxifmXr2QlOUcjgtWgAXIV9FyMcLSJYhPJJJ:tagupxJMT2rPnPlvV59gTfIgK0PuWcoJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ecee44507b0d039f9fdeea961cb3e5d495d0320648d7197118772299d07906c9
Files
-
ecee44507b0d039f9fdeea961cb3e5d495d0320648d7197118772299d07906c9.exe windows:6 windows x86 arch:x86
59e1adc019d3eaa73e6acff6f0d32063
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathAppendW
comctl32
InitCommonControlsEx
kernel32
SetCurrentDirectoryW
ReadFile
FindFirstFileW
GetCommandLineW
FindNextFileW
lstrlenW
lstrcpynW
GetPrivateProfileIntW
GetModuleFileNameW
CreateMutexW
FindClose
WaitForSingleObject
CreateFileW
GetVersionExW
GetPrivateProfileStringW
GetLastError
lstrcatW
DeleteFileW
CloseHandle
CreateThread
HeapAlloc
GetProcAddress
GetFileSize
GetProcessHeap
SetLastError
GetCurrentDirectoryW
GetSystemTimeAsFileTime
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetSystemDefaultLangID
LoadLibraryW
FreeLibrary
GetSystemDirectoryW
SetFilePointerEx
WriteConsoleW
GetModuleHandleW
DecodePointer
GetOEMCP
IsValidCodePage
FindFirstFileExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
EncodePointer
RaiseException
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
WriteFile
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
GetCPInfo
user32
SendMessageW
EndDialog
SetWindowTextW
ShowWindow
DestroyIcon
SetDlgItemTextW
GetDlgItemTextW
SendDlgItemMessageW
IsDlgButtonChecked
wsprintfW
FlashWindowEx
GetDlgItem
CheckDlgButton
GetDesktopWindow
RegisterWindowMessageW
DialogBoxParamW
LoadImageW
EnableWindow
PostMessageW
gdi32
DeleteObject
advapi32
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteW
SHGetSpecialFolderPathW
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 378KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE