D:\SVN\trunk\小陈\肉控\rj\Release\rj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d34ed2df026b376097394233e1f1dfda256c68e5e02ad97517d48475f08473fN.exe
Resource
win7-20240903-en
General
-
Target
0d34ed2df026b376097394233e1f1dfda256c68e5e02ad97517d48475f08473fN.exe
-
Size
150KB
-
MD5
7a4a702b609fa0f75faaefbf23831b40
-
SHA1
0928c27b0f0970fd5df8a4a5b148d67b53e13474
-
SHA256
0d34ed2df026b376097394233e1f1dfda256c68e5e02ad97517d48475f08473f
-
SHA512
290282fd4440f03a8916450eb2cc011c25aa1a9b475d2e0d470da6f01eff4af21002f7b51ee72f84684f639caedfb50c49a8a3dd517d9f6331ceaa5dce21c004
-
SSDEEP
3072:tHyOtBc7XVfkkhKbDrnbZZwNfE+u5EoGCH:5yGqJkkhKXrnFGfvV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d34ed2df026b376097394233e1f1dfda256c68e5e02ad97517d48475f08473fN.exe
Files
-
0d34ed2df026b376097394233e1f1dfda256c68e5e02ad97517d48475f08473fN.exe.exe windows:5 windows x86 arch:x86
7e0c477645e01202f70c6cf2efa990dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAGetLastError
inet_ntoa
inet_addr
htons
ntohs
ioctlsocket
WSAIoctl
connect
WSAStartup
recvfrom
select
gethostbyname
setsockopt
sendto
WSACleanup
recv
socket
closesocket
send
kernel32
WriteConsoleA
GetProcessHeap
SetEndOfFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
SetFilePointer
FlushFileBuffers
DeleteFileA
GetVersionExA
GlobalAlloc
GetConsoleOutputCP
WaitForSingleObject
TerminateThread
Sleep
InterlockedExchange
CloseHandle
CreateThread
SetEvent
CreateEventA
GetLastError
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetModuleFileNameA
WriteConsoleW
lstrlenA
RtlUnwind
GetConsoleMode
GetConsoleCP
SetStdHandle
ReadFile
MultiByteToWideChar
CreateFileA
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
GetCommandLineA
RaiseException
GetModuleHandleA
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
advapi32
RegQueryValueExA
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegCloseKey
pdh
PdhAddCounterA
PdhEnumObjectItemsA
PdhCollectQueryData
PdhGetFormattedCounterValue
PdhOpenQueryA
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
��7}�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE