D:\jenkins\workspace\ci.dingding.manual.new\DingTalk-Win\win\bin\release\DingtalkLauncher.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6ba056346e0138771d37ff15b45316335e0204d1658c530007cbd737ec5f9c5a.exe
Resource
win7-20240903-en
General
-
Target
6ba056346e0138771d37ff15b45316335e0204d1658c530007cbd737ec5f9c5a
-
Size
802KB
-
MD5
dd1393f2f8821ee970384d48acf87f9d
-
SHA1
5c232f56f7431642ecfe8a2c55bf6d8214f735ff
-
SHA256
6ba056346e0138771d37ff15b45316335e0204d1658c530007cbd737ec5f9c5a
-
SHA512
2425a7343d6ae8f9b8abef4cdf0a5a1b3e3972cd7770b1764bdd840054a29fe07b84551c562276652078733f82f9d71b91f67c49f3016a7e8b2c41ba3537d4e7
-
SSDEEP
24576:QTYjc23RnYVt3dhgdQZ2KTKK4KKDyK5FZ1EEEEmEEE1EEEEEEEEEEElKK1KKK1KZ:823lqVdurKTKK4KKDyK5FZ1EEEEmEEEc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ba056346e0138771d37ff15b45316335e0204d1658c530007cbd737ec5f9c5a
Files
-
6ba056346e0138771d37ff15b45316335e0204d1658c530007cbd737ec5f9c5a.exe windows:5 windows x64 arch:x64
16db7cbb53a9ba36803cd018797cdd49
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegEnumValueW
RegQueryInfoKeyW
kernel32
GetCommandLineW
DecodePointer
RaiseException
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
SetEnvironmentVariableW
CreateFileW
GetFileSize
ReadFile
OutputDebugStringW
CloseHandle
GetCurrentProcessId
OpenProcess
FindResourceExW
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
GetPrivateProfileStringW
WritePrivateProfileStringW
MultiByteToWideChar
LoadLibraryW
SetLastError
ExitProcess
TerminateProcess
ResumeThread
VirtualProtectEx
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
VirtualQuery
WriteFile
CreateFileMappingW
UnmapViewOfFile
FreeLibrary
LoadLibraryExW
GetFileAttributesW
ContinueDebugEvent
WaitForDebugEvent
DebugActiveProcessStop
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
Sleep
TerminateThread
GetProcessId
GetTickCount
MapViewOfFile
CopyFileW
WideCharToMultiByte
GetUserDefaultLangID
GetSystemDefaultLangID
K32GetModuleBaseNameW
K32GetModuleFileNameExW
K32GetMappedFileNameW
WriteConsoleW
SetEndOfFile
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
RtlUnwind
ReadConsoleW
LocalFree
GetStringTypeW
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObjectEx
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
EncodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetFileType
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
oleaut32
VariantClear
SysFreeString
SysAllocString
shell32
SHCreateDirectoryExW
SHGetFolderPathW
ShellExecuteExW
shlwapi
PathFileExistsW
user32
MessageBoxW
Sections
.text Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ