Static task
static1
Behavioral task
behavioral1
Sample
Installs_2023.exe
Resource
win10v2004-20231020-en
General
-
Target
Download_Ready-132351.zip
-
Size
21.1MB
-
MD5
0cedd34d02064646abe69c1ef617c84b
-
SHA1
3201e514199c98040063f35754dedfd217cca3a4
-
SHA256
6b7ffb25bf20ca9ed0d5641667ce37982e2dd9698234db1a3f18c0f277f1a7f7
-
SHA512
54d55591ee0a58b2bf44d1a74f047a42d1b68d54f2aab2c88df8672c587e96a9303175045b8f2532d023e166332b3e296fa73dc1febdd54b902ee6532d7fbb3d
-
SSDEEP
393216:fy9ZP7x6DGeaXFVH3mwx19lWwD8Z1V1uXYZLawzj5cfKaPKheUSaSgt3ca:fyL7xTesHJ1/1D8Z1VRLawzj5cfKaPSL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Installs_2023.exe
Files
-
Download_Ready-132351.zip.zip
-
Installs_2023.exe.exe windows:6 windows x86
a1cf31b94850bdfd01700f1653e34f8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
IsValidLocale
WaitForMultipleObjects
HeapReAlloc
lstrlenW
QueryPerformanceFrequency
ExitProcess
SetFileAttributesA
TerminateProcess
GlobalUnlock
CreateFileW
RemoveDirectoryW
WriteConsoleW
VirtualFree
TlsAlloc
MoveFileA
CreateFileA
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetConsoleMode
EnumSystemLocalesW
SetEnvironmentVariableW
VirtualAlloc
SetFilePointer
GetConsoleOutputCP
GetFullPathNameW
GetLocaleInfoW
SetEndOfFile
CompareFileTime
CreateDirectoryW
SetFilePointerEx
SetFileTime
DeleteFileA
SetPriorityClass
WaitForSingleObject
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
TlsFree
GetFileSize
GetModuleHandleW
FormatMessageA
RtlUnwind
CreateSemaphoreA
WriteFile
FindNextFileW
GetSystemInfo
GetModuleHandleA
GetCommandLineW
GetUserDefaultLCID
PeekNamedPipe
VerifyVersionInfoW
IsDebuggerPresent
AcquireSRWLockExclusive
GetStdHandle
FindFirstFileA
QueryPerformanceCounter
FindClose
IsProcessorFeaturePresent
GetProcAddress
GetCurrentProcess
ResetEvent
GetStringTypeW
DeleteCriticalSection
ReadFile
GetModuleFileNameA
GetCurrentThread
MoveFileExW
GetCommandLineA
GetModuleHandleExW
InitializeCriticalSectionEx
CreateEventA
TlsGetValue
GetProcessAffinityMask
CloseHandle
GetCurrentDirectoryA
AreFileApisANSI
SetEvent
ReleaseSemaphore
ExitThread
EnterCriticalSection
CreateDirectoryA
MoveFileW
ReleaseSRWLockExclusive
CreateThread
lstrcatW
GetTickCount
FreeLibraryAndExitThread
FileTimeToLocalFileTime
GetTickCount64
FreeLibrary
GetSystemTimeAsFileTime
SetFileAttributesW
UnhandledExceptionFilter
GetSystemWow64DirectoryW
FlushFileBuffers
InitializeCriticalSection
SleepEx
SystemTimeToTzSpecificLocalTime
ReadConsoleW
SetStdHandle
WideCharToMultiByte
GetDateFormatW
RemoveDirectoryA
FreeEnvironmentStringsW
CompareStringW
LCMapStringW
TlsSetValue
GetOEMCP
FindFirstFileExW
LocalFree
HeapFree
GetACP
lstrlenA
LoadLibraryW
GetCurrentThreadId
FormatMessageW
GlobalMemoryStatus
GetEnvironmentVariableA
GetFileAttributesW
GlobalFree
GetCurrentDirectoryW
lstrcatA
SetUnhandledExceptionFilter
RaiseException
HeapSize
GetFileInformationByHandle
LCMapStringEx
SetLastError
GetSystemDirectoryW
HeapAlloc
LoadLibraryExW
GetTimeZoneInformation
GlobalLock
GetTimeFormatW
GetStartupInfoW
GetDriveTypeW
GetProcessHeap
LoadLibraryA
DecodePointer
FileTimeToSystemTime
EncodePointer
GetModuleFileNameW
IsValidCodePage
GetLastError
GetCPInfo
WaitForSingleObjectEx
GlobalAlloc
GetFileAttributesExW
GetVersionExA
VerSetConditionMask
MultiByteToWideChar
DeleteFileW
FindFirstFileW
GetFileType
FindNextFileA
GetFileSizeEx
GetCurrentProcessId
InitializeSListHead
Sleep
LeaveCriticalSection
user32
LoadStringW
SetFocus
GetWindowRect
MessageBoxA
CloseClipboard
GetWindowLongA
EnableWindow
SetClipboardData
SendMessageA
OpenClipboard
SetWindowLongA
GetParent
CheckDlgButton
GetFocus
LoadIconA
ScreenToClient
KillTimer
SetWindowTextW
SetWindowTextA
EndDialog
wsprintfA
SetCursor
PostMessageA
GetDlgItem
ShowWindow
DialogBoxParamA
GetWindowTextA
EmptyClipboard
MapDialogRect
SystemParametersInfoA
MessageBoxW
DialogBoxParamW
CharUpperW
IsDlgButtonChecked
CharUpperA
SendMessageW
MoveWindow
SetTimer
GetKeyState
GetWindowTextLengthW
LoadCursorA
LoadStringA
GetWindowTextW
MonitorFromWindow
InvalidateRect
GetWindowTextLengthA
GetMonitorInfoA
advapi32
CryptReleaseContext
RegCloseKey
CryptHashData
CryptAcquireContextW
CryptCreateHash
RegOpenKeyExW
CryptEncrypt
CryptImportKey
RegSetValueExW
CryptDestroyHash
CryptDestroyKey
RegCreateKeyExW
CryptGetHashParam
shell32
SHGetPathFromIDListA
SHGetFileInfoA
SHGetSpecialFolderPathW
CommandLineToArgvW
SHGetMalloc
SHBrowseForFolderA
ole32
CoInitialize
OleInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
bcrypt
BCryptGenRandom
crypt32
CryptDecodeObjectEx
CertGetNameStringW
CertAddCertificateContextToStore
CertGetCertificateChain
CertCreateCertificateChainEngine
CryptQueryObject
CryptStringToBinaryW
CertFreeCertificateChainEngine
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertFreeCertificateChain
CertFindCertificateInStore
CertFindExtension
PFXImportCertStore
CertOpenStore
wldap32
ord301
ord147
ord133
ord79
ord142
ord167
ord127
ord145
ord219
ord46
ord14
ord216
ord73
ord208
ord41
ord117
ord26
ord27
ws2_32
getpeername
sendto
recvfrom
WSAEnumNetworkEvents
socket
ioctlsocket
gethostname
getsockopt
send
WSACreateEvent
freeaddrinfo
WSAIoctl
WSACloseEvent
WSAResetEvent
WSAEventSelect
closesocket
WSAGetLastError
ntohs
WSASetLastError
WSAStartup
WSACleanup
htons
setsockopt
WSAWaitForMultipleEvents
__WSAFDIsSet
select
accept
bind
connect
getsockname
htonl
listen
recv
getaddrinfo
Sections
.text Size: 6.4MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 230KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ