K:\DTLSetup\Release\DTLInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fa8ebc6ead664ffe1c7918e463b9e1bc924cde192465a7ef63179662350d2206.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fa8ebc6ead664ffe1c7918e463b9e1bc924cde192465a7ef63179662350d2206.exe
Resource
win10v2004-20231215-en
General
-
Target
fa8ebc6ead664ffe1c7918e463b9e1bc924cde192465a7ef63179662350d2206
-
Size
10.0MB
-
MD5
f4a04fa1e0883a233f89c461953e4dc0
-
SHA1
e31bf224fed94b770746c5a629ddbb944e1babb7
-
SHA256
fa8ebc6ead664ffe1c7918e463b9e1bc924cde192465a7ef63179662350d2206
-
SHA512
8c73948aea73f9448ca663246e18f4e6291e9bae7e6b5325185217a3410cec880805d39d19b4eaa08027e1acdca86ee79614dd8e2b1d0a4bbceb6e68b3073e9b
-
SSDEEP
196608:cYnuBkAWrokMF8U2oW4wELO8UY+kLUmrEja6IujSgvoOH:cYnuaEkM57pDO8UWAmoa8SIXH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa8ebc6ead664ffe1c7918e463b9e1bc924cde192465a7ef63179662350d2206
Files
-
fa8ebc6ead664ffe1c7918e463b9e1bc924cde192465a7ef63179662350d2206.exe windows:5 windows x86 arch:x86
b0da28c850ca529e924cd2722a60b4ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OutputDebugStringW
lstrcmpA
CreateToolhelp32Snapshot
GetCurrentProcess
Process32FirstW
Process32NextW
OpenProcess
GetLogicalDriveStringsW
QueryDosDeviceW
WaitForSingleObject
TerminateProcess
GetCurrentProcessId
GetCurrentDirectoryW
SetCurrentDirectoryW
FindClose
GetFullPathNameW
FindFirstFileW
lstrlenW
SetFileAttributesW
DeleteFileW
FindNextFileW
RemoveDirectoryW
ExitProcess
VirtualProtect
MoveFileExW
Sleep
SetEnvironmentVariableW
GetVersion
LocalFree
GetCommandLineW
GetTempFileNameW
SetEvent
CreateEventW
GetLogicalDrives
GetDriveTypeW
lstrcpyA
lstrcpyW
lstrlenA
MulDiv
GetProfileIntA
GlobalAlloc
GlobalLock
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
FlushFileBuffers
lstrcmpW
ExpandEnvironmentStringsW
ReadConsoleW
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetACP
GetStdHandle
CreateProcessA
DuplicateHandle
GetTempPathW
QueryPerformanceFrequency
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
GetFileAttributesW
SetFileTime
CreateDirectoryW
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
FormatMessageA
GetModuleFileNameA
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
LoadLibraryW
GetDiskFreeSpaceExW
SetLastError
DeleteTimerQueueTimer
GetVersionExW
FreeResource
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
LoadLibraryExW
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
GetCurrentThreadId
EnterCriticalSection
RaiseException
GetTimeZoneInformation
MultiByteToWideChar
CreateFileW
WideCharToMultiByte
GetLastError
CreateMutexW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetFilePointerEx
SetFilePointer
CloseHandle
WriteFile
LeaveCriticalSection
ReadFile
SetEndOfFile
user32
FindWindowW
CreateCaret
SwitchToThisWindow
LoadImageW
GetSystemMetrics
SendMessageW
SetWindowPos
SetWindowLongW
GetWindowLongW
SetWindowTextW
MapWindowPoints
GetClientRect
GetParent
GetWindowRect
GetMonitorInfoW
MonitorFromWindow
GetWindow
SetTimer
PostMessageW
IsIconic
PtInRect
GetDC
ReleaseDC
UpdateLayeredWindow
IsDialogMessageW
PostQuitMessage
GetCursorPos
ScreenToClient
SetCursor
LoadCursorW
DestroyWindow
KillTimer
EndDialog
CharNextW
DefWindowProcW
GetClassInfoW
RegisterClassW
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
UnregisterClassW
CreateDialogParamW
MessageBoxW
EnableWindow
BringWindowToTop
GetActiveWindow
ReleaseCapture
SetCapture
GetWindowThreadProcessId
EnumWindows
LoadStringW
OffsetRect
DestroyCursor
ClientToScreen
ScrollWindowEx
SetCaretPos
HideCaret
ShowCaret
GetCaretPos
UpdateWindow
SetScrollPos
SetScrollRange
EnableScrollBar
ShowScrollBar
InvalidateRect
InflateRect
IntersectRect
GetFocus
GetDlgItem
GetKeyState
GetDesktopWindow
GetDoubleClickTime
GetSysColor
IsRectEmpty
wsprintfW
ExitWindowsEx
gdi32
CreateFontIndirectW
DPtoLP
CreateRectRgn
ExtSelectClipRgn
BitBlt
GetTextMetricsW
GdiSetBatchLimit
GetDeviceCaps
GetObjectW
GetStockObject
CreateDIBSection
DeleteObject
SelectObject
CreateCompatibleDC
DeleteDC
advapi32
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegEnumValueW
ControlService
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
InitializeSecurityDescriptor
shell32
ShellExecuteExW
ord165
ShellExecuteW
SHGetSpecialFolderPathW
SHFileOperationW
CommandLineToArgvW
SHGetPathFromIDListW
SHBrowseForFolderW
ole32
CoTaskMemRealloc
RegisterDragDrop
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
RevokeDragDrop
oleaut32
VarUI4FromStr
SysFreeString
shlwapi
PathRemoveBackslashW
PathCombineW
PathIsURLW
SHDeleteValueW
SHSetValueW
PathGetDriveNumberW
PathRemoveFileSpecW
PathFileExistsW
PathIsDirectoryW
comctl32
InitCommonControlsEx
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipCloneBrush
GdipDeleteGraphics
GdiplusStartup
GdiplusShutdown
GdipAlloc
GdipFree
GdipFillRectangleI
GdipReleaseDC
GdipGetDC
GdipGetClipBoundsI
GdipGetImageHeight
GdipSetInterpolationMode
GdipGetInterpolationMode
GdipLoadImageFromStream
GdipDisposeImage
GdipCloneImage
GdipResetClip
GdipSetClipRect
GdipDeleteFont
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFont
GdipDrawImageRectRect
GdipDeleteBrush
GdipCreateSolidFill
GdipDrawImagePointRectI
GdipDrawString
GdipSetTextRenderingHint
GdipGetTextRenderingHint
GdipGetImageWidth
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateFromHDC
psapi
GetProcessImageFileNameW
urlmon
URLDownloadToFileW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
Sections
.text Size: 525KB - Virtual size: 524KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83.0MB - Virtual size: 83.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ