D:\Project\Install\autoInstall\Release\apple.pdb
Static task
static1
Behavioral task
behavioral1
Sample
794c3562a26320c30ff00d4591984969.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
794c3562a26320c30ff00d4591984969.exe
Resource
win10v2004-20231215-en
General
-
Target
794c3562a26320c30ff00d4591984969
-
Size
1.4MB
-
MD5
794c3562a26320c30ff00d4591984969
-
SHA1
44e01eaaab00df1720c1a7af1bb1c0ea8aa40d78
-
SHA256
e8563746896118beb1ffbbad66c1393045a92ab5722ae0cfbb2f05c15defa67f
-
SHA512
c37e48c5d51d0e7c7b7425dee025dc72e8fb45a3d1f4e05fba5c55ab7075db0888d08419e569dc091c422108007e2c0e1a3455dfbe94cd0ec7e250185d82249b
-
SSDEEP
24576:ZxoR4rjxbUMCADhQagJ6frrrDY6r2ej2VLj4UdQ+Eg0wQBS5x:44rjxbUMhkJ6frrrD2ej21Td61S5x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 794c3562a26320c30ff00d4591984969
Files
-
794c3562a26320c30ff00d4591984969.exe windows:5 windows x86 arch:x86
3d3580df77cbbe8f448150eb6811d5eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathCompactPathExA
PathFileExistsA
gdiplus
GdiplusShutdown
GdipGetImageWidth
GdipCloneImage
GdipCreateFromHDC
GdiplusStartup
GdipAlloc
GdipDrawImageRectI
GdipDeleteGraphics
GdipGetImageHeight
GdipFree
GdipLoadImageFromStream
GdipDisposeImage
kernel32
GlobalFlags
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GetFileSizeEx
GetModuleHandleW
InterlockedIncrement
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
GetTickCount
ExitThread
CreateThread
HeapFree
GetCommandLineA
GetStartupInfoA
HeapAlloc
RtlUnwind
HeapReAlloc
RaiseException
VirtualProtect
VirtualAlloc
VirtualQuery
Sleep
ExitProcess
HeapSize
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
WaitForSingleObject
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
FindNextFileA
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
FormatMessageA
LocalFree
InterlockedDecrement
GetModuleFileNameW
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
MulDiv
GetModuleHandleA
GlobalFree
FreeResource
GetCurrentProcessId
GetLastError
SetLastError
LocalFileTimeToFileTime
GetFileTime
GetFileAttributesA
WriteFile
SetFileTime
lstrlenA
CreateFileA
DosDateTimeToFileTime
GetFullPathNameA
GetModuleFileNameA
lstrcpyA
DeleteFileA
CloseHandle
CopyFileA
RemoveDirectoryA
CreateDirectoryA
MultiByteToWideChar
lstrcatA
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTempPathA
LockResource
GlobalUnlock
SizeofResource
WideCharToMultiByte
GlobalAlloc
GlobalLock
LoadResource
FindResourceA
GetSystemInfo
user32
SetCapture
ReleaseCapture
CharNextA
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
InvalidateRect
UnregisterClassA
LoadCursorA
GetSysColorBrush
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
SetCursor
PostQuitMessage
DestroyMenu
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
UpdateWindow
CreateWindowExA
GetClassInfoExA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnhookWindowsHookEx
CharUpperA
GetSysColor
EndPaint
BeginPaint
GetWindowDC
EnableWindow
PostMessageA
SendMessageA
GetParent
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextA
TabbedTextOutA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
MessageBoxA
GetWindowTextA
FillRect
GetWindowRect
GetSystemMetrics
AppendMenuA
DrawTextExA
GetClientRect
DrawIcon
LoadIconA
IsIconic
GetSystemMenu
RegisterClassA
FindWindowA
IsWindowVisible
GetClassInfoA
ShowWindow
SetForegroundWindow
EnableMenuItem
CheckMenuItem
GetMenuState
ModifyMenuA
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
SetFocus
GetWindowLongA
GetWindow
gdi32
GetStockObject
GetDeviceCaps
SetMapMode
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
CreateFontA
SelectObject
ExtSelectClipRgn
ScaleWindowExtEx
CreateSolidBrush
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
DeleteDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyA
RegCreateKeyExA
RegQueryValueExA
shell32
SHGetFolderPathA
SHFileOperationA
comctl32
InitCommonControlsEx
oledlg
ord8
ole32
CLSIDFromString
CreateStreamOnHGlobal
CoCreateInstance
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
oleaut32
OleCreateFontIndirect
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
wininet
InternetQueryDataAvailable
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
Sections
.text Size: 267KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ