E:\work\capture_lmm\ScreenRecorder\rel\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4bd3288096edc3f85bcdc15a96f75127a63399db3760a38f4197202a36bbbd14.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4bd3288096edc3f85bcdc15a96f75127a63399db3760a38f4197202a36bbbd14.exe
Resource
win10v2004-20231215-en
General
-
Target
4bd3288096edc3f85bcdc15a96f75127a63399db3760a38f4197202a36bbbd14
-
Size
4.8MB
-
MD5
d9560fd96f3602582ee64c7f9f51cf2d
-
SHA1
dc24d79ee30bd696d001b78410a8c85941cd9f86
-
SHA256
4bd3288096edc3f85bcdc15a96f75127a63399db3760a38f4197202a36bbbd14
-
SHA512
c7777e6cb5199387e17822554f046e4d60c0360d903838a3b3fbc6a52b3c3478ceac3927b67500393dffbb655a98b283cc4ff108ba0942ea3f8b7c13db3ba4fb
-
SSDEEP
98304:EJ1seGEdhWhUzw/8lHhPvsDU4IZdaEFWy5sWeMY:qdhkH/uhnwLKzY7MY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bd3288096edc3f85bcdc15a96f75127a63399db3760a38f4197202a36bbbd14
Files
-
4bd3288096edc3f85bcdc15a96f75127a63399db3760a38f4197202a36bbbd14.exe windows:5 windows x86 arch:x86
5cd61f8925fe3759ae611502abe0a199
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
CreateDirectoryW
WritePrivateProfileStringW
LoadLibraryExW
lstrcmpiW
GetProcAddress
FreeLibrary
GetVersion
GetModuleHandleW
FindResourceExW
FindResourceW
GetModuleFileNameW
SizeofResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
GetCurrentThreadId
RaiseException
GetProcessHeap
WriteConsoleW
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LockResource
FlushFileBuffers
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetConsoleCtrlHandler
GetConsoleCP
SetStdHandle
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetCurrentThread
GetACP
GetStdHandle
GetModuleFileNameA
ExitProcess
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
InterlockedFlushSList
RtlUnwind
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetCPInfo
FormatMessageW
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
InterlockedDecrement
InterlockedIncrement
DecodePointer
OpenEventW
LocalAlloc
GetStartupInfoW
CreatePipe
CopyFileW
MoveFileW
CreateThread
GetPrivateProfileIntW
GetFileTime
SetFileTime
GetTempFileNameW
MulDiv
GetCurrentProcessId
GetModuleHandleA
VerifyVersionInfoW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetVersionExW
WideCharToMultiByte
GetPrivateProfileStringW
SystemTimeToFileTime
LocalFileTimeToFileTime
GetTickCount
GetSystemTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
TerminateProcess
Thread32First
Thread32Next
GetCurrentProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
CreateRemoteThread
ReadProcessMemory
LoadLibraryW
lstrcpyW
lstrlenW
GetProcessId
Module32FirstW
Module32NextW
GlobalAlloc
GlobalFree
lstrcmpA
WTSGetActiveConsoleSessionId
GetThreadLocale
SetThreadLocale
DeleteFileW
Sleep
CreateFileW
DeviceIoControl
GetSystemInfo
GetWindowsDirectoryW
GetSystemDirectoryW
GetEnvironmentVariableW
GetTempPathW
LocalFree
GlobalLock
GlobalUnlock
GetFileSize
ReadFile
WriteFile
SetFilePointer
GetFileAttributesExW
OutputDebugStringW
FileTimeToSystemTime
lstrlenA
SetFileAttributesW
MoveFileExW
lstrcpynA
InitializeCriticalSection
FlushViewOfFile
UnmapViewOfFile
SetEndOfFile
CreateFileMappingW
MapViewOfFile
GetFileSizeEx
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
GetLongPathNameW
IsBadReadPtr
GetDriveTypeW
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetNativeSystemInfo
ResetEvent
SetEvent
PostQueuedCompletionStatus
GetExitCodeThread
TerminateThread
CreateEventW
CreateIoCompletionPort
InterlockedExchange
GetQueuedCompletionStatus
SetErrorMode
FreeResource
VerSetConditionMask
CreateFileA
user32
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
MessageBoxW
GetMonitorInfoW
MonitorFromWindow
LoadIconW
wsprintfW
GetWindowThreadProcessId
GetWindow
AttachThreadInput
SetForegroundWindow
BringWindowToTop
SetActiveWindow
FindWindowW
FindWindowExW
SetFocus
WaitForInputIdle
OpenClipboard
EmptyClipboard
CloseClipboard
SetClipboardData
CharLowerBuffW
PostMessageW
SetRectEmpty
EqualRect
SetCursor
ClientToScreen
GetCursorPos
PtInRect
ScreenToClient
GetDoubleClickTime
CopyRect
IntersectRect
DrawTextW
GetDC
ReleaseDC
LoadImageW
IsRectEmpty
GetIconInfo
DrawIconEx
FillRect
SystemParametersInfoW
CharNextW
EndPaint
IsIconic
InvalidateRect
TrackMouseEvent
SetCapture
ReleaseCapture
SetWindowRgn
EnableWindow
GetWindowTextW
IsWindowVisible
IsZoomed
MonitorFromRect
OffsetRect
SetLayeredWindowAttributes
SetWindowTextW
GetWindowTextLengthW
GetFocus
MonitorFromPoint
GetSystemMetrics
UpdateLayeredWindow
UpdateWindow
GetParent
MapWindowPoints
GetWindowRect
GetClientRect
GetDlgItem
SetWindowPos
MoveWindow
ShowWindow
PostQuitMessage
SendMessageW
LoadCursorW
SetWindowLongW
GetWindowLongW
KillTimer
SetTimer
DestroyWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
CallWindowProcW
DefWindowProcW
BeginPaint
GetForegroundWindow
advapi32
GetUserNameA
RegOpenKeyW
RegCreateKeyW
RegSetValueW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
RegEnumKeyW
OpenProcessToken
GetTokenInformation
GetSidSubAuthority
GetSidSubAuthorityCount
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
SetTokenInformation
GetLengthSid
RegConnectRegistryW
DeleteService
ControlService
ChangeServiceConfigW
QueryServiceConfigW
QueryServiceStatus
CloseServiceHandle
CreateServiceW
StartServiceW
OpenServiceW
AccessCheck
MapGenericMask
DuplicateToken
GetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
LookupAccountNameW
GetUserNameW
RegNotifyChangeKeyValue
LookupAccountNameA
GetSidIdentifierAuthority
IsValidSid
RegQueryValueExW
shell32
ShellExecuteW
SHChangeNotify
ShellExecuteExW
SHCreateDirectoryExW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ord165
SHGetFolderPathW
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
CommandLineToArgvW
ole32
CreateStreamOnHGlobal
CoSetProxyBlanket
CoInitializeSecurity
CoCreateGuid
CoInitializeEx
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
OleRun
oleaut32
VariantCopy
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
GetErrorInfo
VariantClear
VariantInit
SysAllocString
CreateErrorInfo
SysAllocStringLen
VariantChangeType
VarDateFromStr
SystemTimeToVariantTime
VariantTimeToSystemTime
VarUI4FromStr
SetErrorInfo
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
shlwapi
StrCpyNW
PathIsRootW
PathCombineW
PathCanonicalizeW
PathRemoveBackslashW
PathIsPrefixW
PathCommonPrefixW
PathRelativePathToW
StrFormatByteSizeW
PathAddBackslashW
StrCmpIW
UrlGetPartW
PathRemoveExtensionW
StrToIntExW
PathFindFileNameW
PathFileExistsW
PathSearchAndQualifyW
PathAppendW
PathRemoveFileSpecW
ord176
AssocQueryStringW
SHDeleteKeyW
SHSetValueW
SHDeleteValueW
PathIsDirectoryW
SHGetValueW
comctl32
ord17
InitCommonControlsEx
msimg32
AlphaBlend
crypt32
CertGetNameStringW
CryptStringToBinaryA
CryptStringToBinaryW
CryptBinaryToStringA
CryptBinaryToStringW
gdiplus
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipCreateHBITMAPFromBitmap
GdipSetTextRenderingHint
GdipDrawString
GdipMeasureString
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdiplusStartup
GdipDeleteStringFormat
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipDrawImageRectRectI
GdipCreateStringFormat
GdipCloneBrush
GdipCreateSolidFill
GdipDeleteBrush
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetInterpolationMode
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdipAlloc
GdipCreateFromHDC
GdipFree
wininet
InternetSetFilePointer
HttpQueryInfoW
InternetCrackUrlW
InternetOpenW
InternetSetOptionW
InternetConnectW
InternetReadFile
HttpOpenRequestW
InternetCloseHandle
InternetQueryOptionW
HttpSendRequestW
dbghelp
ImageDirectoryEntryToData
ImageNtHeader
psapi
EnumProcessModules
GetModuleFileNameExW
wtsapi32
WTSQueryUserToken
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
netapi32
Netbios
iphlpapi
GetIpAddrTable
GetAdaptersInfo
secur32
GetUserNameExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wintrust
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseCatalogContext
CryptCATAdminReleaseContext
WinVerifyTrust
CryptCATAdminAcquireContext
WTHelperProvDataFromStateData
gdi32
SetStretchBltMode
DeleteDC
BitBlt
SetPixel
CreateCompatibleDC
StretchBlt
DeleteObject
CreateDIBSection
GetTextExtentPointW
SelectObject
SetTextColor
GetBitmapBits
SetBitmapBits
CreateSolidBrush
SetBkMode
CreateRoundRectRgn
CombineRgn
CreateRectRgn
SetBkColor
GetStockObject
GetObjectW
SaveDC
CreateRectRgnIndirect
ExtSelectClipRgn
SetTextCharacterExtra
GetCurrentObject
GetTextColor
CreateFontIndirectW
RestoreDC
Rectangle
CreatePen
GetDeviceCaps
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24.8MB - Virtual size: 24.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ