| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2024-Nov-06 06:54:17 |
| Detected languages |
English - United States
Process Default Language |
| TLS Callbacks | 1 callback(s) detected. |
| Debug artifacts |
D:\xigncode-neo\_work\xigncode-build\xigncode-build\neo\vsproject\bin\x64\Release\ucldr_x64.pdb
|
| CompanyName | Wellbia.com Co., Ltd. |
| FileDescription | Wellbia.com Security Loader |
| FileVersion | 2024.11.6.36 |
| InternalName | wldr.exe |
| LegalCopyright | Copyright (C) 2006 - 2018 Wellbia.com Co., Ltd. |
| OriginalFilename | wldr.exe |
| ProductName | Wellbia.com Security Loader |
| ProductVersion | 5.0.0.1 |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains references to system / monitoring tools:
|
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to SHA256
Uses constants related to SHA512 Uses constants related to Blowfish Microsoft's Cryptography API |
| Malicious | The file headers were tampered with. |
Unusual section name found:
Section is both writable and executable. The RICH header checksum is invalid. |
| Suspicious | The PE contains functions most legitimate programs don't use. |
Functions which can be used for anti-debugging purposes:
|
| Malicious | The PE is possibly a dropper. |
Resource 101 is possibly compressed or encrypted.
Resource 164 detected as a PE Executable. |
| Info | The PE is digitally signed. |
Signer: Wellbia.com Co.
Issuer: DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 |
| Suspicious | VirusTotal score: 1/71 (Scanned on 2026-03-26 03:44:10) | Sangfor: Trojan.Win32.Save.a |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x120 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 7 |
| TimeDateStamp | 2024-Nov-06 06:54:17 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x35800 |
| SizeOfInitializedData | 0x566400 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000000000BBCC10 (Section: ) |
| BaseOfCode | 0xbaf000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 5.2 |
| ImageVersion | 0.0 |
| SubsystemVersion | 5.2 |
| Win32VersionValue | 0 |
| SizeOfImage | 0xdf0000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x852dde |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.DLL |
CreateThread
CreateProcessW QueryPerformanceCounter CreateMutexW CreateEventA CreateFileA CloseHandle WideCharToMultiByte FindClose FindFirstFileW SetFilePointer FindNextFileA FindNextFileW CreateMutexA WaitForSingleObject FindFirstFileA GetTickCount CreateThread ReadFile WriteFile |
|---|---|
| USER32.DLL |
RegisterClassA
GetMessageA DispatchMessageA DispatchMessageW SetWindowsHookExA FindWindowW DefWindowProcW FindWindowA CharNextExA SendMessageW SetTimer EnumWindows UnregisterClassW UnregisterClassA KillTimer GetMessageW RegisterClassW TranslateMessage SendMessageA SetWindowsHookExW |
| GDI32.DLL |
ResetDCW
GetStockObject |
| ADVAPI32.dll |
SetEntriesInAclW
CryptGenRandom CryptReleaseContext CryptAcquireContextA AllocateAndInitializeSid FreeSid SetSecurityDescriptorDacl |
| WLDAP32.dll |
#143
#217 #46 #211 |
| WS2_32.dll |
inet_ntoa
WSAStartup gethostbyname |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 2024.11.6.36 |
| ProductVersion | 5.0.0.1 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | Process Default Language |
| CompanyName | Wellbia.com Co., Ltd. |
| FileDescription | Wellbia.com Security Loader |
| FileVersion (#2) | 2024.11.6.36 |
| InternalName | wldr.exe |
| LegalCopyright | Copyright (C) 2006 - 2018 Wellbia.com Co., Ltd. |
| OriginalFilename | wldr.exe |
| ProductName | Wellbia.com Security Loader |
| ProductVersion (#2) | 5.0.0.1 |
| Resource LangID | Process Default Language |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2024-Nov-06 06:54:17 |
| Version | 0.0 |
| SizeofData | 120 |
| AddressOfRawData | 0xba4a14 |
| PointerToRawData | 0x606014 |
| Referenced File | D:\xigncode-neo\_work\xigncode-build\xigncode-build\neo\vsproject\bin\x64\Release\ucldr_x64.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2024-Nov-06 06:54:17 |
| Version | 0.0 |
| SizeofData | 20 |
| AddressOfRawData | 0xba5a14 |
| PointerToRawData | 0x607014 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2024-Nov-06 06:54:17 |
| Version | 0.0 |
| SizeofData | 928 |
| AddressOfRawData | 0xba6a14 |
| PointerToRawData | 0x608014 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2024-Nov-06 06:54:17 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
| StartAddressOfRawData | 0x14016c1b0 |
|---|---|
| EndAddressOfRawData | 0x14016c1b8 |
| AddressOfIndex | 0x1401867ac |
| AddressOfCallbacks | 0x140b90010 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_4BYTES
|
| Callbacks |
0x0000000140BBCD20
|
| Size | 0x100 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x140181170 |
| XOR Key | 0xd974e7d6 |
|---|---|
| Unmarked objects | 0 |
| 241 (40116) | 14 |
| 243 (40116) | 174 |
| 242 (40116) | 27 |
| ASM objects (27051) | 1 |
| 199 (41118) | 8 |
| ASM objects (VS 2015/2017 runtime 26706) | 9 |
| C++ objects (VS 2015/2017 runtime 26706) | 63 |
| C objects (VS 2015/2017 runtime 26706) | 35 |
| Imports (VS2008 SP1 build 30729) | 15 |
| Total imports | 311 |
| C objects (27045) | 132 |
| C objects (27051) | 59 |
| C++ objects (LTCG) (27051) | 61 |
| Resource objects (27051) | 1 |
| 151 | 1 |
| Linker (27051) | 1 |
No comments yet.