c:\Projects.NET\UInstall\UInstall\Release\UInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a0e39edafe801a682bf06112f1209ef2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0e39edafe801a682bf06112f1209ef2.exe
Resource
win10v2004-20240221-en
General
-
Target
a0e39edafe801a682bf06112f1209ef2
-
Size
53KB
-
MD5
a0e39edafe801a682bf06112f1209ef2
-
SHA1
4497743f9aaf346751bcfc4df0cf434ff174b901
-
SHA256
79bc4c200d90e91166eee150d7eaf73fc05b3bf3bbdb3bbfdb436009f07d3870
-
SHA512
77a4b1671fd554393821c73274835a350c7b70b0955124c6a9c21a97f9f56ce5754011ab65d10e53c7ec4dfb8f4b8697a78439c29ae3697d684e60f3dd4fc546
-
SSDEEP
1536:sNEiWQnz7iuDuRLVy2z57NmWerZdDoLHSWNfhzS9M:Qny3UW0DorSWN5zKM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0e39edafe801a682bf06112f1209ef2
Files
-
a0e39edafe801a682bf06112f1209ef2.exe windows:4 windows x86 arch:x86
72f5ce5dc0583916066aba0978c025d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LockResource
GetVersionExA
LoadLibraryA
FreeLibrary
GetTempPathA
GetFileAttributesA
GetWindowsDirectoryA
lstrcpyA
CreateDirectoryA
GetLastError
GetCurrentProcessId
DeleteFileA
GetProcAddress
WaitForSingleObject
CloseHandle
CreateFileA
WriteFile
GetModuleFileNameA
lstrlenA
GetTempFileNameA
GetShortPathNameA
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
ResumeThread
GetProcessHeap
RaiseException
lstrcmpiA
GetStringTypeExA
GetThreadLocale
lstrcmpA
FindResourceExA
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
DeleteCriticalSection
InitializeCriticalSection
GetFileSize
LoadResource
MapViewOfFile
CompareStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
lstrcatA
MultiByteToWideChar
OpenProcess
TerminateProcess
lstrlenW
RemoveDirectoryA
lstrcpynA
FileTimeToSystemTime
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
VirtualQuery
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
SizeofResource
FindResourceA
SystemTimeToFileTime
GetLocalTime
GetCommandLineA
CreateFileMappingA
HeapFree
user32
DestroyWindow
PostQuitMessage
CharNextA
wsprintfA
UnregisterClassA
RegisterClassExA
GetClassInfoExA
LoadCursorA
CreateWindowExA
GetSystemMetrics
SendMessageTimeoutA
IsWindow
GetWindowThreadProcessId
FindWindowA
CallWindowProcA
DefWindowProcA
GetWindowLongA
SetWindowLongA
wvsprintfA
CharUpperA
MessageBoxA
advapi32
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
shell32
SHGetPathFromIDListA
SHFileOperationA
SHGetMalloc
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VarR8FromStr
shlwapi
PathGetArgsA
PathFindFileNameA
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ