Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.PUA.Win32.PdfPass.A.17331.30904.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.PUA.Win32.PdfPass.A.17331.30904.exe
Resource
win10v2004-20231215-en
General
-
Target
SecuriteInfo.com.PUA.Win32.PdfPass.A.17331.30904.exe
-
Size
434KB
-
MD5
f2b44895b800ce988f1e070936d3e53a
-
SHA1
7689666ee2a5af0f0367863bd37fc484f8eb142f
-
SHA256
81e72d2883c3006f4d3de6387e03cc3896033c8769c6ffe66b417f2852f687ef
-
SHA512
32d719b24a375a4c5ddf71d7a420edbecc043b15c879a1bf844558c5e5b4ee199d135a55ba381dc67fa94363def9acd92bbdd9ff4da1002ea085d97065652839
-
SSDEEP
6144:cQaj+ez0AbmbEvdjkJESK/rLtEbUg6SXzROduK5gOU8bT2tV6v:cb70Aa0d+grLtEbUg68YQBLhc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.PUA.Win32.PdfPass.A.17331.30904.exe
Files
-
SecuriteInfo.com.PUA.Win32.PdfPass.A.17331.30904.exe.exe windows:1 windows x86 arch:x86
e77aeabfa56b56935de3d99a5375d1bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
ord17
ord16
user32
wsprintfA
AppendMenuA
BeginPaint
CharToOemA
CharUpperA
CheckDlgButton
CloseClipboard
CopyRect
CreateDialogIndirectParamA
CreatePopupMenu
CreateWindowExA
DefDlgProcA
DefWindowProcA
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawEdge
DrawFrameControl
DrawIconEx
DrawIcon
DrawStateA
DrawTextA
EmptyClipboard
EnableWindow
EndDialog
EndPaint
FillRect
GetActiveWindow
GetClassLongA
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetDlgItemInt
GetDlgItemTextA
GetFocus
GetForegroundWindow
GetMenu
GetMessageA
GetMessageTime
GetParent
GetSysColor
GetSystemMetrics
GetWindowDC
GetWindowLongA
GetWindowRect
GetWindowTextA
InflateRect
InvalidateRect
IsDlgButtonChecked
IsRectEmpty
KillTimer
LoadAcceleratorsA
LoadCursorA
LoadIconA
LoadImageA
MapDialogRect
MessageBoxA
OemToCharA
OffsetRect
OpenClipboard
PostMessageA
PostQuitMessage
RegisterClassA
RegisterClassExA
ReleaseCapture
ReleaseDC
ScreenToClient
SendDlgItemMessageA
SendMessageA
SetCapture
SetClassLongA
SetClipboardData
SetDlgItemInt
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
UpdateWindow
WinHelpA
WindowFromDC
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
CreateDIBitmap
CreateFontIndirectA
CreatePen
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
GetStockObject
GetTextExtentPoint32A
GetTextMetricsA
LineTo
MoveToEx
SelectClipRgn
SelectObject
SetBkMode
SetPixel
SetTextColor
StretchBlt
TextOutA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
CloseHandle
CreateEventA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
ExitThread
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetThreadPriority
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetVersionExA
GetVersion
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalUnlock
InitializeCriticalSection
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MapViewOfFile
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ResumeThread
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
lstrcpyA
lstrlenA
lstrlenW
comdlg32
GetOpenFileNameA
GetSaveFileNameA
Sections
.text Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE