msiexec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0944d2fa82d7435add154996306a6bc5f5c1fdb103ee31b369f23d7626fd4738.exe
Resource
win10v2004-20240226-en
General
-
Target
0944d2fa82d7435add154996306a6bc5f5c1fdb103ee31b369f23d7626fd4738
-
Size
1.3MB
-
MD5
89d9803fb9e31bea616ebf09c1ea9f9b
-
SHA1
ab1f9ceb107384096a45a70c700443d5600e0a35
-
SHA256
0944d2fa82d7435add154996306a6bc5f5c1fdb103ee31b369f23d7626fd4738
-
SHA512
2b29fb450d951be25ca1e96837fc19df9f9cf1b9d8e6cbd78577d24959d18d5f1cb3ea6a50c2defe1a2552b99ed17852a1d7b096532fb139aa4d6247d1b16e76
-
SSDEEP
12288:11x//7D3IkxjbBzCXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9L:17/QqjpCsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0944d2fa82d7435add154996306a6bc5f5c1fdb103ee31b369f23d7626fd4738
Files
-
0944d2fa82d7435add154996306a6bc5f5c1fdb103ee31b369f23d7626fd4738.exe windows:10 windows x64 arch:x64
0990a9500ff8df93e0e059ee13e7c796
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
GetTokenInformation
SetSecurityDescriptorGroup
MakeAbsoluteSD
MakeSelfRelativeSD
RegQueryValueExW
OpenThreadToken
AddAccessAllowedAce
GetSecurityDescriptorLength
GetLengthSid
StartServiceCtrlDispatcherW
RegOpenKeyExW
InitializeAcl
InitializeSecurityDescriptor
SetThreadToken
FreeSid
OpenProcessToken
RegSetValueExW
RegisterServiceCtrlHandlerW
RegCreateKeyExW
SetServiceStatus
AllocateAndInitializeSid
EqualSid
GetAce
SetSecurityDescriptorOwner
RegEnumKeyW
RegCloseKey
RevertToSelf
AdjustTokenPrivileges
SetSecurityDescriptorDacl
LookupPrivilegeValueW
kernel32
CompareStringW
SetLastError
EnterCriticalSection
GetCommandLineW
GetCurrentProcess
lstrlenW
GetStdHandle
WriteFile
GetModuleHandleExW
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
GetEnvironmentVariableW
GetLocaleInfoW
WaitForSingleObject
OpenEventW
GetVersionExW
GetSystemDefaultLangID
GetACP
OpenProcess
GetVersion
SetProcessMitigationPolicy
CreateEventW
MultiByteToWideChar
Sleep
FormatMessageW
GetLastError
OutputDebugStringW
SetEvent
GetCurrentThread
GlobalAlloc
GlobalFree
CloseHandle
LoadLibraryW
CreateThread
SetCurrentDirectoryW
GetProcAddress
DeleteCriticalSection
ExitProcess
UnhandledExceptionFilter
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
GetFileType
lstrcmpW
LoadLibraryExW
GetSystemDirectoryW
LoadLibraryExA
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
DelayLoadFailureHook
GetStartupInfoW
user32
MsgWaitForMultipleObjects
DispatchMessageW
PeekMessageW
IsCharAlphaNumericW
TranslateMessage
PostThreadMessageW
PostQuitMessage
GetMessageW
msvcrt
_XcptFilter
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
_ismbblead
__setusermatherr
_initterm
_acmdln
_fmode
_commode
_lock
_unlock
__dllonexit
_onexit
memcpy
memset
?terminate@@YAXXZ
_vsnprintf
_wcsicmp
__C_specific_handler
_vsnwprintf
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
ole32
CoUninitialize
CoRegisterClassObject
StgOpenStorage
CoRevokeClassObject
CoInitialize
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 4KB - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE