X:\rgsc_streams\sdk\release_16\build\Installers\uninstallRGSCRedistributable_x86.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2ec18c5750db4d97c52a26091e4d0b63ff219c74135ad9f11139fb52c6477ee1.exe
Resource
win7-20240221-en
General
-
Target
2ec18c5750db4d97c52a26091e4d0b63ff219c74135ad9f11139fb52c6477ee1
-
Size
1.9MB
-
MD5
593e4caad27075208a38b5c7291df62d
-
SHA1
a4ab447a2c5a1e6b892908cb23273b2c60afcce9
-
SHA256
2ec18c5750db4d97c52a26091e4d0b63ff219c74135ad9f11139fb52c6477ee1
-
SHA512
91d483b31a0c24f0b9cf3cf87f3493ef4a03e8945f7a29e9d28473569cf7046956065b19a745b9186fefbc73a931bf72b184fb55ea3c961ea7baea179448002c
-
SSDEEP
49152:Kmw5IuZjVGw755WSyCjClUlVbOH3eQPC:oIUtxyeVqHOQq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ec18c5750db4d97c52a26091e4d0b63ff219c74135ad9f11139fb52c6477ee1
Files
-
2ec18c5750db4d97c52a26091e4d0b63ff219c74135ad9f11139fb52c6477ee1.exe windows:6 windows x86 arch:x86
0b054c4000d90d9155106c920e638cce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryExW
VerifyVersionInfoW
GetEnvironmentVariableW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
RemoveDirectoryW
WriteFile
GetTempPathW
CloseHandle
GetLastError
Sleep
TerminateProcess
CreateProcessW
OpenProcess
GetModuleFileNameW
GetModuleHandleW
LoadResource
LockResource
SizeofResource
FindResourceW
FreeLibrary
SetDllDirectoryW
MoveFileExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetThreadLocale
SetThreadUILanguage
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetFileSizeEx
SetFilePointer
SetLastError
GetCurrentProcessId
GetCurrentThreadId
MoveFileW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentDirectoryW
SetSearchPathMode
GetSystemTimeAsFileTime
VerSetConditionMask
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryExA
VirtualQuery
VirtualProtect
GetSystemInfo
RaiseException
InitializeSListHead
msvcp140
_Xtime_get_ticks
_Thrd_detach
_Mtx_init_in_situ
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_unlock
_Cnd_do_broadcast_at_thread_exit
?_Throw_C_error@std@@YAXH@Z
?_Throw_Cpp_error@std@@YAXH@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
vcruntime140
memmove
_except_handler4_common
memcpy
memset
__current_exception_context
__current_exception
__CxxFrameHandler3
_CxxThrowException
_purecall
__std_exception_destroy
__std_exception_copy
memchr
__std_terminate
api-ms-win-crt-runtime-l1-1-0
_exit
_c_exit
_register_thread_local_exe_atexit_callback
terminate
_controlfp_s
_initialize_narrow_environment
_initterm_e
_initterm
_get_narrow_winmain_command_line
exit
_configure_narrow_argv
_beginthreadex
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-string-l1-1-0
wcscpy_s
wcscat_s
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vswscanf
__p__commode
__stdio_common_vsnprintf_s
fclose
__stdio_common_vswprintf
api-ms-win-crt-filesystem-l1-1-0
_wchmod
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
realloc
_callnewh
malloc
api-ms-win-crt-utility-l1-1-0
srand
api-ms-win-crt-time-l1-1-0
_mktime64
_time64
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE