I:\build_new\trunk4.0_en\package\install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
24cc73931fceb2bc20682d11a7efb70ebe38eaa26d203573cb3738b14875d644.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24cc73931fceb2bc20682d11a7efb70ebe38eaa26d203573cb3738b14875d644.exe
Resource
win10v2004-20240221-en
General
-
Target
24cc73931fceb2bc20682d11a7efb70ebe38eaa26d203573cb3738b14875d644
-
Size
5.5MB
-
MD5
3bbdffaac057ceac533324ecd970ebb4
-
SHA1
12c9db469d71e459ebaefc7e44d488eab27a824e
-
SHA256
24cc73931fceb2bc20682d11a7efb70ebe38eaa26d203573cb3738b14875d644
-
SHA512
978e7c2149d654b97db69f94c96d5435def7e694b50f9cb7045b67aa82001a4fe4fdc6504d9b50200a9d9593ba1ed7936d0f8e71250f7baac87a06d83a2fc9ed
-
SSDEEP
98304:2LhyYSMsJae4+aNusvScb1MTyeIMCr5ptbIHkS/F9aQyyO3JIh64EmZqjxIM:2y9Ms0e6NhScZMz7O5IHkS/F9Rv64wqM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24cc73931fceb2bc20682d11a7efb70ebe38eaa26d203573cb3738b14875d644
Files
-
24cc73931fceb2bc20682d11a7efb70ebe38eaa26d203573cb3738b14875d644.exe windows:5 windows x86 arch:x86
17837196831812684f6a1b60a5c6234c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetTickCount
GetCurrentProcessId
GlobalAlloc
GlobalFree
CreateMutexW
FreeResource
SetProcessWorkingSetSize
GetCommandLineW
GetLocalTime
GetCurrentThreadId
IsDebuggerPresent
CreateEventW
DeviceIoControl
GetDriveTypeW
GetLogicalDriveStringsW
GetStartupInfoW
GetVersionExW
GetSystemInfo
GetPriorityClass
TerminateProcess
Module32NextW
Module32FirstW
DuplicateHandle
GetCurrentProcess
MoveFileExW
CopyFileW
CreateDirectoryW
GetExitCodeProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetWindowsDirectoryW
OpenProcess
CreateProcessW
GetVolumeInformationW
GetDiskFreeSpaceExW
RemoveDirectoryW
FindClose
FindNextFileW
SetLastError
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
ReadFile
FreeLibrary
lstrcmpiW
GetModuleFileNameW
DecodePointer
FindFirstFileW
DeleteFileW
CreateFileW
GetModuleHandleW
GetProcAddress
LoadLibraryW
FindResourceExW
FindResourceW
SizeofResource
LockResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetFilePointerEx
FlushFileBuffers
GetFileType
GetConsoleMode
GetConsoleCP
WriteFile
GetStdHandle
VirtualProtect
VirtualFree
VirtualAlloc
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
GetOEMCP
IsValidCodePage
GetModuleHandleExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
CreateTimerQueue
UnregisterWait
RegisterWaitForSingleObject
GetSystemDirectoryW
WideCharToMultiByte
MultiByteToWideChar
LocalFree
SetThreadPriority
WaitForSingleObject
ResumeThread
CloseHandle
GetLastError
GetStringTypeW
FindFirstFileExW
GetFileAttributesExW
GetSystemTimeAsFileTime
GetCurrentThread
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
EncodePointer
GetACP
GetFileSize
ExitProcess
MulDiv
GlobalLock
GlobalUnlock
GetUserDefaultUILanguage
CreateThread
ExitThread
LoadLibraryExW
IsProcessorFeaturePresent
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
user32
ExitWindowsEx
PostQuitMessage
ShowWindow
BringWindowToTop
PostMessageW
SetWindowTextW
SendMessageW
wsprintfW
KillTimer
SetTimer
GetWindowRect
MoveWindow
MonitorFromWindow
GetMonitorInfoW
FindWindowExW
GetGUIThreadInfo
InvalidateRgn
CreateAcceleratorTableW
EnableWindow
ClientToScreen
SetCaretPos
ShowCaret
HideCaret
CreateCaret
wvsprintfW
SetCursor
UnionRect
OffsetRect
LoadCursorW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
SetWindowPos
IsIconic
SetFocus
GetSystemMetrics
SetPropW
GetPropW
GetClientRect
GetWindowLongW
SetWindowLongW
GetParent
GetWindow
LoadImageW
DestroyWindow
IsWindowVisible
CharNextW
GetActiveWindow
GetFocus
GetSysColor
SetCapture
ReleaseCapture
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetCursorPos
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
PtInRect
IsZoomed
SetWindowRgn
MessageBoxW
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
DrawTextW
FillRect
SetRect
GetKeyState
advapi32
DuplicateTokenEx
RegOpenKeyExW
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
SetSecurityInfo
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
RegCreateKeyW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegOpenKeyW
RegDeleteValueW
RegCreateKeyExW
shell32
SHBrowseForFolderW
ord165
SHChangeNotify
SHGetFolderPathW
ShellExecuteExW
SHGetMalloc
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
ole32
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoCreateInstance
wininet
HttpQueryInfoW
InternetCrackUrlW
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetReadFile
gdiplus
GdiplusShutdown
GdiplusStartup
GdipFree
GdipCloneBrush
GdipDeleteBrush
GdipCreateLineBrushI
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetCompositingQuality
GdipSetSmoothingMode
GdipSetPixelOffsetMode
GdipAlloc
GdipSetInterpolationMode
GdipGraphicsClear
GdipDrawImage
GdipDrawImageRectI
GdipDeleteFontFamily
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipGetFamily
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipLoadImageFromStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipSetTextRenderingHint
shlwapi
PathFileExistsW
PathAppendW
psapi
EnumProcessModules
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
comctl32
_TrackMouseEvent
ord17
imm32
ImmReleaseContext
ImmGetVirtualKey
ImmSetCompositionWindow
ImmGetContext
ImmSetCompositionFontW
gdi32
GetTextMetricsW
GetObjectW
SetWindowOrgEx
CreateRoundRectRgn
GetObjectA
CreatePatternBrush
CreateSolidBrush
SetBkMode
SetTextColor
CombineRgn
CreatePenIndirect
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SelectObject
SaveDC
RestoreDC
Rectangle
GetDeviceCaps
GdiFlush
ExtTextOutW
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
RoundRect
SelectClipRgn
ExtSelectClipRgn
SetBkColor
StretchBlt
SetStretchBltMode
CreateDIBSection
MoveToEx
TextOutW
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
Sections
.text Size: 852KB - Virtual size: 852KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 424.9MB - Virtual size: 424.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ