D:\a\pia_desktop\pia_desktop\out\pia_release_x86_64\pia-windows-x64-3.5.3-07926\pia-windows-x64-3.5.3-07926.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b3077e413e666d8bebad6020f5f35f24af2ca01b091e989f179a6b79a02a53d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b3077e413e666d8bebad6020f5f35f24af2ca01b091e989f179a6b79a02a53d4.exe
Resource
win10v2004-20231215-en
General
-
Target
b3077e413e666d8bebad6020f5f35f24af2ca01b091e989f179a6b79a02a53d4
-
Size
10.0MB
-
MD5
0130ece0418ec8ef182b8b12fdd96257
-
SHA1
a54f7ba922e5a695cb1b64e307182cf4081ec8e9
-
SHA256
b3077e413e666d8bebad6020f5f35f24af2ca01b091e989f179a6b79a02a53d4
-
SHA512
9357756f89ceaa55a0703aaef7491b48d34bf74be93cce4a9735f5f4e8b0b92bdb8bf5bf516e98a6943088f72a9f0fec4d08d14724161462acaa64f71d5869b6
-
SSDEEP
196608:OcikhDZe7lrmKCWxLZb9m4oQY8fcyKJyFAP8squvQzpUET82+4BadHhBX:VDZeawZb9WQYZJDPxKF2BX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3077e413e666d8bebad6020f5f35f24af2ca01b091e989f179a6b79a02a53d4
Files
-
b3077e413e666d8bebad6020f5f35f24af2ca01b091e989f179a6b79a02a53d4.exe windows:6 windows x64 arch:x64
b203b7e491a33190493c29e2b0e043a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoW
SetupInstallFromInfSectionW
SetupSetNonInteractiveMode
SetupInstallServicesFromInfSectionW
SetupCloseInfFile
SetupDiOpenDevRegKey
SetupDiSetDeviceRegistryPropertyW
SetupUninstallOEMInfW
SetupDiGetClassDevsExW
SetupDiEnumDriverInfoW
SetupDiBuildDriverInfoList
SetupDiCallClassInstaller
SetupOpenInfFileW
SetupDiCreateDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
advapi32
ChangeServiceConfig2W
RegSetKeyValueW
RegDeleteKeyValueW
RegGetValueW
RegCreateKeyExW
RegSaveKeyExW
RegDeleteTreeW
RegSetValueExW
RegOpenKeyExW
RegRestoreKeyW
CreateProcessWithTokenW
DuplicateTokenEx
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
CreateServiceW
RegCloseKey
RegQueryValueExW
OpenServiceW
ChangeServiceConfigW
StartServiceW
ControlService
DeleteService
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
kernel32
FindNextFileW
GetEnvironmentVariableW
FindClose
CreateFileW
Sleep
FormatMessageW
GetLastError
DeleteFileW
CloseHandle
LocalFree
MoveFileExW
VerSetConditionMask
WideCharToMultiByte
VerifyVersionInfoW
SizeofResource
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
GetCurrentThreadId
CreateEventW
GetExitCodeThread
SetEvent
LockResource
CreateThread
LoadResource
SetLastError
DeleteCriticalSection
GetTickCount
GetCurrentProcess
GetModuleFileNameW
OpenProcess
LoadLibraryW
GetProcAddress
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
FreeLibrary
GetTempFileNameW
GetFileSizeEx
WriteFile
LockFile
SetFilePointer
MultiByteToWideChar
UnlockFile
GetSystemTime
FlushFileBuffers
GetExitCodeProcess
CreateDirectoryW
RemoveDirectoryW
SetFileAttributesW
SetFileTime
TerminateProcess
WaitForMultipleObjects
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
lstrcmpiW
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
RtlUnwind
FindFirstFileW
ReadFile
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
HeapSize
WriteConsoleW
SetEndOfFile
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
FindResourceW
InitializeSListHead
HeapReAlloc
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
GetFileType
HeapAlloc
HeapFree
GetStdHandle
GetModuleHandleExW
ExitProcess
GetCommandLineW
GetCommandLineA
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RaiseException
RtlPcToFileHeader
RtlUnwindEx
gdi32
CreateSolidBrush
DeleteObject
SetBkColor
GetObjectW
Rectangle
CreatePen
SetBkMode
SetTextColor
DeleteDC
GetFontLanguageInfo
GetStockObject
CreateFontW
GetCharacterPlacementW
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
AddFontMemResourceEx
BitBlt
ExtTextOutW
IntersectClipRect
user32
GetWindowLongPtrW
RegisterClassExW
ShowWindow
DispatchMessageW
SetTimer
LoadBitmapW
TranslateMessage
SetWindowLongPtrW
LoadCursorW
SetCapture
KillTimer
PostQuitMessage
SystemParametersInfoW
RegisterWindowMessageW
PtInRect
UnregisterClassW
LoadImageW
InvalidateRect
BeginPaint
EndPaint
GetWindowTextW
GetSystemMetrics
MessageBoxW
DestroyWindow
GetWindowRect
PostMessageW
DefWindowProcW
GetMessageW
LoadStringW
GetShellWindow
GetWindowThreadProcessId
EnumWindows
SendMessageW
CreateWindowExW
ReleaseCapture
FillRect
ChangeWindowMessageFilterEx
shell32
SHFileOperationW
SHGetFolderPathW
shlwapi
PathFileExistsW
PathIsDirectoryW
ole32
CoInitializeEx
CoCreateInstance
Sections
.text Size: 333KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20.8MB - Virtual size: 20.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ