K:\DTLSetup\Release\DTLInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2d3c6bc5afd5faa91e1ae20e59e20b1de6bea4f98fcd8931768e3590460d5433.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2d3c6bc5afd5faa91e1ae20e59e20b1de6bea4f98fcd8931768e3590460d5433.exe
Resource
win10v2004-20240226-en
General
-
Target
2d3c6bc5afd5faa91e1ae20e59e20b1de6bea4f98fcd8931768e3590460d5433
-
Size
4.8MB
-
MD5
6d1a6a8892acef9280ba1e0d7855770d
-
SHA1
67948c2ad25bf97c953bb584ddcedd327d30d220
-
SHA256
2d3c6bc5afd5faa91e1ae20e59e20b1de6bea4f98fcd8931768e3590460d5433
-
SHA512
9d1aa82f4ac8807105d1f8b52cfb0e51420c9ca6e2d73e9e2358e71ab4bb3b61106a17bf07fc9fd6bd59c0380c83e729354c856c3792aa1694af5e6636899ed7
-
SSDEEP
98304:5aUG1YdRbMzNuffD0FmvynEMfzMnlRxDMPe:AobGgfbaLrMlDDMG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d3c6bc5afd5faa91e1ae20e59e20b1de6bea4f98fcd8931768e3590460d5433
Files
-
2d3c6bc5afd5faa91e1ae20e59e20b1de6bea4f98fcd8931768e3590460d5433.exe windows:5 windows x86 arch:x86
b0da28c850ca529e924cd2722a60b4ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OutputDebugStringW
lstrcmpA
CreateToolhelp32Snapshot
GetCurrentProcess
Process32FirstW
Process32NextW
OpenProcess
GetLogicalDriveStringsW
QueryDosDeviceW
WaitForSingleObject
TerminateProcess
GetCurrentProcessId
GetCurrentDirectoryW
SetCurrentDirectoryW
FindClose
GetFullPathNameW
FindFirstFileW
lstrlenW
SetFileAttributesW
DeleteFileW
FindNextFileW
RemoveDirectoryW
ExitProcess
VirtualProtect
MoveFileExW
Sleep
SetEnvironmentVariableW
GetVersion
LocalFree
GetCommandLineW
GetTempFileNameW
SetEvent
CreateEventW
GetLogicalDrives
GetDriveTypeW
lstrcpyA
lstrcpyW
lstrlenA
MulDiv
GetProfileIntA
GlobalAlloc
GlobalLock
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
FlushFileBuffers
lstrcmpW
ExpandEnvironmentStringsW
ReadConsoleW
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetACP
GetStdHandle
CreateProcessA
DuplicateHandle
GetTempPathW
QueryPerformanceFrequency
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
GetFileAttributesW
SetFileTime
CreateDirectoryW
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
FormatMessageA
GetModuleFileNameA
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
LoadLibraryW
GetDiskFreeSpaceExW
SetLastError
DeleteTimerQueueTimer
GetVersionExW
FreeResource
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
LoadLibraryExW
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
GetCurrentThreadId
EnterCriticalSection
RaiseException
GetTimeZoneInformation
MultiByteToWideChar
CreateFileW
WideCharToMultiByte
GetLastError
CreateMutexW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetFilePointerEx
SetFilePointer
CloseHandle
WriteFile
LeaveCriticalSection
ReadFile
SetEndOfFile
user32
FindWindowW
CreateCaret
SwitchToThisWindow
LoadImageW
GetSystemMetrics
SendMessageW
SetWindowPos
SetWindowLongW
GetWindowLongW
SetWindowTextW
MapWindowPoints
GetClientRect
GetParent
GetWindowRect
GetMonitorInfoW
MonitorFromWindow
GetWindow
SetTimer
PostMessageW
IsIconic
PtInRect
GetDC
ReleaseDC
UpdateLayeredWindow
IsDialogMessageW
PostQuitMessage
GetCursorPos
ScreenToClient
SetCursor
LoadCursorW
DestroyWindow
KillTimer
EndDialog
CharNextW
DefWindowProcW
GetClassInfoW
RegisterClassW
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
UnregisterClassW
CreateDialogParamW
MessageBoxW
EnableWindow
BringWindowToTop
GetActiveWindow
ReleaseCapture
SetCapture
GetWindowThreadProcessId
EnumWindows
LoadStringW
OffsetRect
DestroyCursor
ClientToScreen
ScrollWindowEx
SetCaretPos
HideCaret
ShowCaret
GetCaretPos
UpdateWindow
SetScrollPos
SetScrollRange
EnableScrollBar
ShowScrollBar
InvalidateRect
InflateRect
IntersectRect
GetFocus
GetDlgItem
GetKeyState
GetDesktopWindow
GetDoubleClickTime
GetSysColor
IsRectEmpty
wsprintfW
ExitWindowsEx
gdi32
CreateFontIndirectW
DPtoLP
CreateRectRgn
ExtSelectClipRgn
BitBlt
GetTextMetricsW
GdiSetBatchLimit
GetDeviceCaps
GetObjectW
GetStockObject
CreateDIBSection
DeleteObject
SelectObject
CreateCompatibleDC
DeleteDC
advapi32
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegEnumValueW
ControlService
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
InitializeSecurityDescriptor
shell32
ShellExecuteExW
ord165
ShellExecuteW
SHGetSpecialFolderPathW
SHFileOperationW
CommandLineToArgvW
SHGetPathFromIDListW
SHBrowseForFolderW
ole32
CoTaskMemRealloc
RegisterDragDrop
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
RevokeDragDrop
oleaut32
VarUI4FromStr
SysFreeString
shlwapi
PathRemoveBackslashW
PathCombineW
PathIsURLW
SHDeleteValueW
SHSetValueW
PathGetDriveNumberW
PathRemoveFileSpecW
PathFileExistsW
PathIsDirectoryW
comctl32
InitCommonControlsEx
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipCloneBrush
GdipDeleteGraphics
GdiplusStartup
GdiplusShutdown
GdipAlloc
GdipFree
GdipFillRectangleI
GdipReleaseDC
GdipGetDC
GdipGetClipBoundsI
GdipGetImageHeight
GdipSetInterpolationMode
GdipGetInterpolationMode
GdipLoadImageFromStream
GdipDisposeImage
GdipCloneImage
GdipResetClip
GdipSetClipRect
GdipDeleteFont
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFont
GdipDrawImageRectRect
GdipDeleteBrush
GdipCreateSolidFill
GdipDrawImagePointRectI
GdipDrawString
GdipSetTextRenderingHint
GdipGetTextRenderingHint
GdipGetImageWidth
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateFromHDC
psapi
GetProcessImageFileNameW
urlmon
URLDownloadToFileW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
Sections
.text Size: 525KB - Virtual size: 524KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83.7MB - Virtual size: 83.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ