msiexec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b720a1fa71ce84f3f498d03c7ee81610310266b5a0843bc8cbae91d6f0451ac2.exe
Resource
win10v2004-20240226-en
General
-
Target
b720a1fa71ce84f3f498d03c7ee81610310266b5a0843bc8cbae91d6f0451ac2
-
Size
218KB
-
MD5
ea91166f154ee391838afc6a733c0d2a
-
SHA1
5d292f0aa6247b7e23f8ef99bc2e8aff3a734d28
-
SHA256
b720a1fa71ce84f3f498d03c7ee81610310266b5a0843bc8cbae91d6f0451ac2
-
SHA512
59b93a774b7234f42155d391b5e00563000b43b1d0d8295268d0c7ca52348933f2a90113275240c1094a1d7cb4fdac542a22d965110d2cc54d07e08d7c015842
-
SSDEEP
6144:vw3sgU6EU9EvvIyIHX+b9uGJ0BH5+hfEB:I8DU2vvIfHvG+H5+h+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b720a1fa71ce84f3f498d03c7ee81610310266b5a0843bc8cbae91d6f0451ac2
Files
-
b720a1fa71ce84f3f498d03c7ee81610310266b5a0843bc8cbae91d6f0451ac2.exe windows:10 windows x86 arch:x86
e0d979269c63193c89243179c86490f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetTokenInformation
SetSecurityDescriptorGroup
MakeAbsoluteSD
MakeSelfRelativeSD
RegQueryValueExW
OpenThreadToken
AddAccessAllowedAce
GetSecurityDescriptorLength
GetLengthSid
StartServiceCtrlDispatcherW
RegOpenKeyExW
InitializeAcl
InitializeSecurityDescriptor
SetThreadToken
FreeSid
OpenProcessToken
RegSetValueExW
RegisterServiceCtrlHandlerW
RegCreateKeyExW
SetServiceStatus
AllocateAndInitializeSid
EqualSid
GetAce
SetSecurityDescriptorOwner
RegEnumKeyW
RegCloseKey
RevertToSelf
AdjustTokenPrivileges
SetSecurityDescriptorDacl
LookupPrivilegeValueW
kernel32
CompareStringW
SetLastError
EnterCriticalSection
GetCommandLineW
GetCurrentProcess
lstrlenW
GetStdHandle
WriteFile
GetModuleHandleExW
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
GetEnvironmentVariableW
GetLocaleInfoW
WaitForSingleObject
OpenEventW
GetVersionExW
GetSystemDefaultLangID
GetACP
OpenProcess
GetVersion
SetProcessMitigationPolicy
CreateEventW
MultiByteToWideChar
Sleep
FormatMessageW
GetLastError
OutputDebugStringW
SetEvent
GetCurrentThread
GlobalAlloc
GlobalFree
CloseHandle
LoadLibraryW
CreateThread
SetCurrentDirectoryW
GetProcAddress
DeleteCriticalSection
ExitProcess
UnhandledExceptionFilter
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
GetFileType
lstrcmpW
LoadLibraryExW
GetSystemDirectoryW
LoadLibraryExA
GetTickCount
GetSystemTimeAsFileTime
DelayLoadFailureHook
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
TerminateProcess
SetUnhandledExceptionFilter
GetStartupInfoA
user32
PeekMessageW
GetMessageW
MsgWaitForMultipleObjects
DispatchMessageW
IsCharAlphaNumericW
TranslateMessage
PostThreadMessageW
PostQuitMessage
msvcrt
_XcptFilter
__p__commode
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
__p__fmode
_ismbblead
__setusermatherr
_initterm
_acmdln
_lock
_unlock
__dllonexit
_onexit
memcpy
memset
?terminate@@YAXXZ
_controlfp
_vsnwprintf
_wcsicmp
_vsnprintf
ntdll
RtlUnwind
NtQueryInformationProcess
ole32
CoRegisterClassObject
StgOpenStorage
CoRevokeClassObject
CoInitialize
CoUninitialize
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE