setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8b316d209a6f2b5d9d94a1744eee6bf8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b316d209a6f2b5d9d94a1744eee6bf8.exe
Resource
win10v2004-20231215-en
General
-
Target
8b316d209a6f2b5d9d94a1744eee6bf8
-
Size
754KB
-
MD5
8b316d209a6f2b5d9d94a1744eee6bf8
-
SHA1
6d3d633f32e01b5f08ecd1f80a4109deda8e30c1
-
SHA256
edef895bc529dcae4bc6ae5310e417ce262ffcef15b0b22f37c6f5692e839624
-
SHA512
7293a2ab007f8cfeda903f251e29dd2ac97cbc0490b0873a2c2b17c41fc2d8e09af9fe7dc03e20358e5cafb94deb120847acf2fa8e7faef3f43b75fa7106e640
-
SSDEEP
12288:Bk5kjobJQGNwNuPxtneKBh+ISQShHhCrkbgZSaTedBr2n/ES9:BqXlxNwkxtvBh+IBShHhCrkbgZSI+RVA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b316d209a6f2b5d9d94a1744eee6bf8
Files
-
8b316d209a6f2b5d9d94a1744eee6bf8.exe windows:5 windows x86 arch:x86
758a65218c29d26b7488d36c591e7485
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
FindResourceW
LoadResource
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalHandle
GlobalFree
MulDiv
lstrcmpW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentDirectoryW
GetDriveTypeW
Sleep
FreeLibrary
lstrcmpiW
SizeofResource
LoadLibraryExW
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
SetCurrentDirectoryW
HeapSetInformation
OpenMutexW
CreateMutexW
SetErrorMode
LoadLibraryW
GetVersion
GetShortPathNameW
lstrlenW
WritePrivateProfileStringW
GetTempPathW
GetVersionExW
SetFileAttributesW
GetFileAttributesW
GetCommandLineW
InitializeCriticalSection
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
DeleteCriticalSection
RaiseException
GetWindowsDirectoryW
SetEnvironmentVariableA
GetTimeZoneInformation
SetEndOfFile
PeekNamedPipe
GetFileInformationByHandle
GetLocalTime
FindFirstFileExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
SetLastError
FlushInstructionCache
GetCurrentProcess
GetModuleFileNameW
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
CloseHandle
CreateProcessW
GetLastError
FindFirstFileW
GetPrivateProfileSectionW
CreateSemaphoreW
WritePrivateProfileSectionW
CopyFileW
CreateThread
IsWow64Process
GetPrivateProfileStringW
EnumUILanguagesW
GlobalReAlloc
ReadFile
GetSystemDirectoryW
GetVersionExA
lstrcmpA
FindClose
GetTempFileNameW
FormatMessageW
GetModuleHandleA
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
GetProcessHeap
InterlockedPushEntrySList
InterlockedCompareExchange
FlushFileBuffers
SetStdHandle
GetSystemInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
HeapReAlloc
HeapSize
GetOEMCP
GetACP
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
SetHandleCount
GetModuleHandleW
GetProcAddress
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
HeapFree
HeapAlloc
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
gdi32
CreateFontIndirectW
RealizePalette
SelectPalette
CreatePalette
CreateDIBitmap
SetDIBitsToDevice
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetStockObject
GetObjectW
GetTextExtentPoint32W
DeleteDC
GetDeviceCaps
CreateDCW
PatBlt
SelectObject
DeleteObject
user32
SetWindowPos
MapWindowPoints
GetClientRect
GetParent
GetWindowRect
MonitorFromWindow
KillTimer
GetActiveWindow
PostQuitMessage
ScreenToClient
GetWindow
GetDlgItem
GetTitleBarInfo
BeginPaint
IsWindowVisible
GetSysColorBrush
MessageBoxA
LoadStringA
SetCursor
MsgWaitForMultipleObjects
GetKeyboardType
UnregisterClassA
ExitWindowsEx
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
EndPaint
TranslateMessage
MapDialogRect
IsChild
GetFocus
SetFocus
IsWindow
GetSysColor
DestroyWindow
ClientToScreen
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
GetDesktopWindow
DestroyAcceleratorTable
SetWindowContextHelpId
EndDialog
SetTimer
MoveWindow
RedrawWindow
InvalidateRect
ReleaseDC
GetDC
GetSystemMenu
EnableMenuItem
GetSystemMetrics
ShowWindow
shell32
CommandLineToArgvW
ShellExecuteExW
SHGetMalloc
ole32
CreateStreamOnHGlobal
OleUninitialize
CoTaskMemAlloc
StringFromGUID2
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
CoRevokeClassObject
CoInitializeEx
OleRun
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
LoadRegTypeLi
GetErrorInfo
VarBstrCmp
VarUI4FromStr
VariantInit
VariantClear
LoadTypeLi
OleCreateFontIndirect
SysAllocString
SysAllocStringLen
SysStringLen
SysFreeString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
comctl32
ord17
Exports
Exports
_DecodePointerInternal@4
_EncodePointerInternal@4
Sections
.text Size: 382KB - Virtual size: 382KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 17KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 257KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.pdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE