E:\code_test\rel\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
93587e6b80916ba8916540d5dc8ada24c396fee86bcbfff78afafbf7764f1892.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
93587e6b80916ba8916540d5dc8ada24c396fee86bcbfff78afafbf7764f1892.exe
Resource
win10v2004-20231222-en
General
-
Target
93587e6b80916ba8916540d5dc8ada24c396fee86bcbfff78afafbf7764f1892
-
Size
4.8MB
-
MD5
7915e1e40bca27d3c85ac1f5f4a6562c
-
SHA1
646237011fb7c7ebb813ea354ae9ea2bbc296431
-
SHA256
93587e6b80916ba8916540d5dc8ada24c396fee86bcbfff78afafbf7764f1892
-
SHA512
9b16f4693e250112c7ab513a219aa67daef9ffc132eb6a020aa8743428f1d858faabfe154e41d6b9296ac36dc7574726c6c9cf931ab50c46dd62886c952ea1f3
-
SSDEEP
49152:nhFsSLpD7LZZiZZEk2iWMCaRAyJOl22R9OiLarRurVl7HH+vwzzJGUxPsoEEf7mv:MW4Yq2R97LvVwYzJ/sXEfFGLJnK6sHg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93587e6b80916ba8916540d5dc8ada24c396fee86bcbfff78afafbf7764f1892
Files
-
93587e6b80916ba8916540d5dc8ada24c396fee86bcbfff78afafbf7764f1892.exe windows:5 windows x86 arch:x86
619b69a49ca2954d8eae20010259d4a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
lstrcpynA
FlushViewOfFile
UnmapViewOfFile
SetEndOfFile
CreateFileMappingW
MapViewOfFile
GetFileSizeEx
GetLongPathNameW
IsBadReadPtr
GetDriveTypeW
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetSystemInfo
GetWindowsDirectoryW
GetSystemDirectoryW
GlobalLock
GlobalUnlock
GetFileAttributesExW
GetNativeSystemInfo
ResetEvent
SetEvent
PostQueuedCompletionStatus
GetExitCodeThread
TerminateThread
CreateEventW
CreateIoCompletionPort
InterlockedExchange
GetQueuedCompletionStatus
InitializeCriticalSection
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
SetErrorMode
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetConsoleCtrlHandler
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
SetStdHandle
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
GetACP
MoveFileExW
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
ResumeThread
ExitThread
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
RtlUnwind
WaitForMultipleObjectsEx
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
SetProcessAffinityMask
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
QueryPerformanceFrequency
QueryPerformanceCounter
GetStringTypeW
FormatMessageW
TryEnterCriticalSection
WaitForSingleObjectEx
DuplicateHandle
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
SetFileAttributesW
GetThreadLocale
SetThreadLocale
WTSGetActiveConsoleSessionId
lstrcmpA
Module32NextW
Module32FirstW
GetProcessId
lstrlenW
FindNextFileW
lstrcpyW
ReadProcessMemory
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
Thread32Next
Thread32First
lstrlenA
GetVersionExW
CreateFileA
FlushFileBuffers
GetFileSize
DeviceIoControl
OpenEventW
LocalAlloc
GetShortPathNameW
GetCurrentThread
SetThreadPriority
GetCurrentProcess
SetPriorityClass
GetEnvironmentVariableW
ReadFile
GetStartupInfoW
CreatePipe
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
CreateDirectoryW
MoveFileW
FindClose
RemoveDirectoryW
FindFirstFileW
TerminateProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CopyFileW
WritePrivateProfileStringW
Sleep
LocalFree
CreateThread
SetFilePointer
GetPrivateProfileStringW
GetPrivateProfileIntW
GetFileTime
SetFileTime
DeleteFileW
CloseHandle
WriteFile
CreateFileW
RtlCaptureStackBackTrace
GetTempFileNameW
GetTempPathW
OutputDebugStringW
LoadLibraryW
GetTickCount
MulDiv
GetCurrentProcessId
OpenProcess
GetModuleHandleA
VerifyVersionInfoW
VerSetConditionMask
FreeResource
GlobalFree
GlobalAlloc
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryExW
lstrcmpiW
GetProcAddress
FreeLibrary
GetVersion
GetModuleHandleW
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
FindResourceExW
FindResourceW
SizeofResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LockResource
DecodePointer
SetEnvironmentVariableW
OutputDebugStringA
WriteConsoleW
GetStdHandle
user32
DestroyWindow
SetTimer
KillTimer
IsWindow
SetWindowLongW
LoadCursorW
SendMessageW
PostQuitMessage
ShowWindow
MoveWindow
SetWindowPos
GetDlgItem
GetClientRect
GetWindowRect
MessageBoxW
MapWindowPoints
GetParent
GetWindow
LoadIconW
MonitorFromWindow
GetMonitorInfoW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
CharNextW
SetRectEmpty
EqualRect
SetCursor
ClientToScreen
GetCursorPos
PtInRect
ScreenToClient
GetDoubleClickTime
CopyRect
IntersectRect
PostMessageW
LoadImageW
IsRectEmpty
GetIconInfo
DrawIconEx
FillRect
DrawTextW
SystemParametersInfoW
BeginPaint
EndPaint
IsIconic
InvalidateRect
CharLowerBuffW
WaitForInputIdle
FindWindowExW
FindWindowW
SetClipboardData
CloseClipboard
CreateWindowExW
GetClassInfoExW
RegisterClassExW
TrackMouseEvent
SetFocus
SetCapture
ReleaseCapture
SetWindowRgn
EnableWindow
GetForegroundWindow
GetWindowTextW
SetForegroundWindow
IsWindowVisible
IsZoomed
MonitorFromRect
OffsetRect
SetLayeredWindowAttributes
CallWindowProcW
DefWindowProcW
EmptyClipboard
OpenClipboard
wsprintfW
UnregisterClassW
GetWindowLongW
UpdateWindow
UpdateLayeredWindow
SetActiveWindow
BringWindowToTop
AttachThreadInput
GetWindowThreadProcessId
GetSystemMetrics
MonitorFromPoint
ReleaseDC
GetDC
GetFocus
GetWindowTextLengthW
SetWindowTextW
gdi32
CreatePen
SaveDC
CreateRectRgnIndirect
ExtSelectClipRgn
GetDeviceCaps
GetStockObject
SetBkColor
CreateRectRgn
CombineRgn
CreateRoundRectRgn
SetTextColor
SetBkMode
Rectangle
SetBitmapBits
GetBitmapBits
StretchBlt
SetStretchBltMode
DeleteDC
BitBlt
SetPixel
SelectObject
CreateCompatibleDC
GetObjectW
DeleteObject
CreateDIBSection
RestoreDC
CreateFontIndirectW
GetTextColor
GetCurrentObject
CreateSolidBrush
SetTextCharacterExtra
advapi32
DeleteService
RegCreateKeyExW
DeregisterEventSource
ReportEventW
RegisterEventSourceW
RegNotifyChangeKeyValue
RegConnectRegistryW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
GetUserNameA
LookupAccountNameA
IsValidSid
AccessCheck
MapGenericMask
DuplicateToken
GetFileSecurityW
GetLengthSid
SetTokenInformation
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
EnumServicesStatusExW
CreateProcessAsUserW
DuplicateTokenEx
GetTokenInformation
OpenProcessToken
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueW
RegCreateKeyW
RegOpenKeyW
CryptDecrypt
CryptEncrypt
CryptSetKeyParam
CryptImportKey
CryptContextAddRef
CryptGenRandom
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
LookupAccountNameW
GetUserNameW
ControlService
ChangeServiceConfigW
QueryServiceConfigW
QueryServiceStatus
RegEnumKeyW
CloseServiceHandle
CreateServiceW
StartServiceW
OpenServiceW
OpenSCManagerW
RegQueryValueExW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
shell32
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetMalloc
SHGetSpecialFolderPathW
SHChangeNotify
ShellExecuteExW
CommandLineToArgvW
SHCreateDirectoryExW
ord165
SHGetFolderPathW
SHBrowseForFolderW
ole32
OleRun
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoInitializeEx
oleaut32
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
SysStringByteLen
SystemTimeToVariantTime
VarBstrCmp
SetErrorInfo
VariantChangeType
GetErrorInfo
SysAllocStringLen
SysAllocStringByteLen
VarDateFromStr
SysAllocString
VarUI4FromStr
LoadRegTypeLi
LoadTypeLi
CreateErrorInfo
SysFreeString
SysStringLen
shlwapi
PathFindFileNameW
PathRemoveExtensionW
PathRemoveFileSpecW
PathAddBackslashW
PathAppendW
PathCombineW
PathFileExistsW
wnsprintfA
PathRemoveBackslashW
SHDeleteValueW
SHSetValueW
SHDeleteKeyW
SHGetValueW
AssocQueryStringW
UrlGetPartW
PathSearchAndQualifyW
PathIsDirectoryW
ord176
StrCpyNW
PathIsRootW
PathCanonicalizeW
PathIsPrefixW
PathCommonPrefixW
PathRelativePathToW
StrFormatByteSizeW
StrToIntExW
StrCmpIW
comctl32
ord17
InitCommonControlsEx
msimg32
AlphaBlend
gdiplus
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawString
GdipSetTextRenderingHint
GdipCreateFromHDC
GdipCreateSolidFill
GdipCreateFont
GdipDeleteBrush
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFile
GdipDeleteFont
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipDrawImageRectRectI
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetInterpolationMode
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdipAlloc
GdipFree
GdiplusStartup
GdipCreateBitmapFromFileICM
GdipCloneBrush
dbghelp
ImageDirectoryEntryToData
ImageNtHeader
wininet
InternetReadFile
InternetSetFilePointer
HttpQueryInfoW
InternetCrackUrlW
InternetOpenW
InternetSetOptionW
InternetConnectW
InternetCloseHandle
HttpSendRequestW
HttpOpenRequestW
crypt32
CryptStringToBinaryA
CryptBinaryToStringW
CryptBinaryToStringA
CertGetNameStringW
CryptStringToBinaryW
psapi
GetModuleFileNameExW
EnumProcessModules
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wintrust
CryptCATAdminReleaseCatalogContext
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminCalcHashFromFileHandle
WinVerifyTrust
WTHelperProvDataFromStateData
CryptCATAdminAcquireContext
CryptCATAdminReleaseContext
netapi32
Netbios
iphlpapi
GetAdaptersInfo
GetIpAddrTable
secur32
GetUserNameExW
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 291KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12.6MB - Virtual size: 12.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ