Static task
static1
Behavioral task
behavioral1
Sample
PST_7.1.1/PST_7.1.1_GENERAL.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PST_7.1.1/PST_7.1.1_GENERAL.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
PST_7.1.1/PST_uni_patch.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
PST_7.1.1/PST_uni_patch.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
PST_7.1.1/Update para Triplets1.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
PST_7.1.1/Update para Triplets1.exe
Resource
win10v2004-20231215-en
General
-
Target
5692079cb6e20dc22ed0c6ee5ff46fe4
-
Size
12.5MB
-
MD5
5692079cb6e20dc22ed0c6ee5ff46fe4
-
SHA1
39dc964c844bf208f67a985b3175e743812d3d29
-
SHA256
2ef756bf0942884563ba568ef5cf0a2bff198e35723662797e8afd52a743ae37
-
SHA512
8a1717e9733a6b87f701c2aea6b8828a2d646508fede46b28e8bba37de3732e08f7a8e0c6b32784a806433d4dbaca703e474d65d017d671d60680eefe9a242d6
-
SSDEEP
196608:37oN5Un6dMM9cebn4WurODPKSiP6HLpaHkZYlSihI2sRr65GSow7oJMsc/eg9qU/:cE2cunLeSvuJ10Sow7oWsPUMBK
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/PST_7.1.1/PST_7.1.1_GENERAL.exe unpack001/PST_7.1.1/PST_uni_patch.exe unpack001/PST_7.1.1/Update para Triplets1.exe
Files
-
5692079cb6e20dc22ed0c6ee5ff46fe4.rar
-
PST_7.1.1/PST_7.1.1_GENERAL.exe.exe windows:4 windows x86 arch:x86
5523dda9a438aa3992e03f3746f19bf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetLastError
SetLastError
lstrcmpiA
lstrlenA
CompareStringW
GetVersionExA
DeleteFileA
CompareStringA
GetWindowsDirectoryA
GetTempPathA
GetFileAttributesA
GetTempFileNameA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GetTickCount
LockResource
LoadResource
FindResourceA
lstrcpyA
SetErrorMode
FreeLibrary
RemoveDirectoryA
LeaveCriticalSection
EnterCriticalSection
CreateThread
CreateMutexA
WaitForSingleObject
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
SetEvent
OpenEventA
GetModuleHandleA
GetCurrentThreadId
HeapAlloc
GetSystemInfo
HeapCreate
lstrcpynA
lstrcatA
GetPrivateProfileIntA
lstrlenW
FindFirstFileA
SetFilePointer
GetProcAddress
LoadLibraryA
GetShortPathNameA
GetSystemDefaultLangID
MoveFileA
FindResourceExA
GetFileSize
HeapDestroy
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SizeofResource
GetStartupInfoA
ExitProcess
GetCommandLineA
DebugBreak
HeapReAlloc
HeapFree
VirtualQuery
VirtualProtect
SearchPathA
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcmpA
MultiByteToWideChar
GetCurrentThread
GetVersion
IsBadReadPtr
ReadFile
Sleep
WriteFile
CloseHandle
CreateEventA
QueryPerformanceFrequency
InterlockedDecrement
InterlockedIncrement
CreateFileA
GetModuleFileNameA
CreateDirectoryA
WideCharToMultiByte
WritePrivateProfileStringA
GetPrivateProfileStringA
FindClose
CreateProcessA
GetCurrentProcess
user32
MsgWaitForMultipleObjects
LoadStringA
CharNextA
PeekMessageA
PostThreadMessageA
CharUpperA
SetTimer
SetWindowRgn
DialogBoxIndirectParamA
SetActiveWindow
CharLowerBuffA
CreateDialogIndirectParamA
GetDlgItem
SendMessageA
SetDlgItemTextA
LoadIconA
GetWindowRect
SystemParametersInfoA
SetWindowPos
CharLowerA
GetWindowTextA
GetDesktopWindow
ScreenToClient
MoveWindow
KillTimer
DestroyWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
SetWindowTextA
ShowWindow
EndDialog
wsprintfA
gdi32
CreateFontIndirectA
LPtoDP
GetTextExtentPoint32A
DeleteObject
GetObjectA
advapi32
RegCreateKeyExA
OpenThreadToken
OpenProcessToken
GetTokenInformation
RegCloseKey
RegOpenKeyExA
RegSetValueExA
AllocateAndInitializeSid
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegQueryValueA
FreeSid
EqualSid
ole32
CoTaskMemFree
StringFromGUID2
GetRunningObjectTable
CoCreateInstance
CoCreateGuid
CoReleaseMarshalData
CoInitialize
CoGetInterfaceAndReleaseStream
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
StringFromCLSID
CoTaskMemAlloc
CoMarshalInterThreadInterfaceInStream
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
VariantCopy
VariantClear
LoadRegTypeLi
LoadTypeLi
RegisterTypeLi
SysAllocString
lz32
LZClose
LZCopy
LZOpenFileA
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
PST_7.1.1/PST_uni_patch.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
PST_7.1.1/Update para Triplets1.exe.exe windows:4 windows x86 arch:x86
7ddc8a0c20627fd4913ab93f34b77aff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
FindExecutableA
user32
SetForegroundWindow
EndDialog
DefWindowProcA
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
RegisterClassA
OemToCharBuffA
LoadCursorA
CharUpperBuffA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
DestroyWindow
SetWindowTextA
SetActiveWindow
SetTimer
KillTimer
DialogBoxIndirectParamA
GetDlgItemTextA
SetWindowPos
GetKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
InvalidateRect
UpdateWindow
wsprintfA
MessageBoxA
SetCursor
CharNextA
GetWindowRect
GetSystemMetrics
kernel32
CreateDirectoryA
GetVolumeInformationA
_lclose
GlobalFree
RtlUnwind
GetCommandLineA
GetModuleHandleA
ExitProcess
GetModuleFileNameA
SetErrorMode
GetVersion
LoadLibraryA
GetProcAddress
FreeLibrary
lstrcmpiA
GetWindowsDirectoryA
GetEnvironmentVariableA
LocalAlloc
LocalFree
GlobalHandle
GlobalUnlock
_lopen
GlobalAlloc
GlobalLock
WinExec
_llseek
GetDriveTypeA
_lread
_lwrite
lstrlenA
lstrcatA
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
_lcreat
lstrcpyA
gdi32
SetTextAlign
SetBkColor
SetTextColor
DeleteObject
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ