f:\CB\11X_Main\LocalKit\Tools\Win\Installer\AdobeSelfExtractor\Release\AdobeSelfExtractor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b991d81f355bea0f04265235a22cdda4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b991d81f355bea0f04265235a22cdda4.exe
Resource
win10v2004-20231215-en
General
-
Target
b991d81f355bea0f04265235a22cdda4
-
Size
399KB
-
MD5
b991d81f355bea0f04265235a22cdda4
-
SHA1
a8adb507671bc29b7b7d63043a19847b5b50f6d8
-
SHA256
7f81dca6fa6268bae85b734af31b0ef42eb16b4c11a5ff8f8982cf2c528eb735
-
SHA512
6c069b55399f7283bd53c7474b25752e29a2a2e5aadac6f321703650900589fbc42bb55579280fdda8a79011d6ac077d940c52255e867727a8e6ded7708eb9fc
-
SSDEEP
6144:NouWBpcuFNA9Til+S7uHL2w/niW6aru5Rc2Cej10fkFevjtLoLuTQTwDUIVnH2VZ:NouRil+S7uH6w/iRvD2f3vjhoLatH2VZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b991d81f355bea0f04265235a22cdda4
Files
-
b991d81f355bea0f04265235a22cdda4.exe windows:5 windows x86 arch:x86
36632610a044b4b8ae589b4226d406da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord70
kernel32
LocalReAlloc
DeleteCriticalSection
TlsFree
WritePrivateProfileStringW
GetCurrentDirectoryW
GlobalFlags
lstrlenA
SetErrorMode
GetFileSizeEx
GetFileTime
GetStartupInfoW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
SetEnvironmentVariableW
SetCurrentDirectoryW
RtlUnwind
RaiseException
HeapReAlloc
ExitThread
SetStdHandle
GetFileType
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsSetValue
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetTickCount
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetCurrentDirectoryA
GetDriveTypeA
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GetModuleHandleA
InterlockedDecrement
FreeResource
GetCurrentProcessId
GlobalAddAtomW
SuspendThread
ResumeThread
SetThreadPriority
GetFullPathNameW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
LoadLibraryW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetModuleFileNameW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
lstrcmpW
FreeLibrary
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleW
GetProcAddress
lstrlenW
GetVolumeInformationW
WideCharToMultiByte
CreateThread
SetFileTime
MoveFileW
VirtualAlloc
VirtualFree
RemoveDirectoryW
SetFileAttributesW
GetExitCodeProcess
CreateProcessW
CreateDirectoryW
GetPrivateProfileStringW
SetEvent
Sleep
WaitForSingleObject
ResetEvent
CreateEventW
GlobalMemoryStatusEx
GetEnvironmentVariableW
GetVersionExW
GetTempPathW
DeleteFileW
GetCommandLineW
LocalFree
FormatMessageW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
GetFileAttributesW
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
GetFileSize
CreateFileA
SetHandleCount
user32
DestroyMenu
UnregisterClassW
LoadCursorW
GetSysColorBrush
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
CharUpperW
GetWindowTextW
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
SetWindowLongW
GetDlgCtrlID
GetWindowLongW
IsDialogMessageW
SendDlgItemMessageW
GetWindow
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
FindWindowW
SetWindowTextW
GetDlgItem
EnableWindow
IsWindow
DrawIcon
GetClientRect
IsIconic
SendMessageW
LoadIconW
PostMessageW
GetSystemMetrics
MessageBoxW
gdi32
DeleteDC
GetStockObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetDeviceCaps
CreateFontW
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
SelectObject
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegFlushKey
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetFolderPathW
ord165
SHBrowseForFolderW
shlwapi
PathFindExtensionW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
oleaut32
VariantClear
VariantChangeType
VariantInit
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35.9MB - Virtual size: 35.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ