D:\Dev\Tin5\InstallDir\vc80-win32u\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cc7183906cbb77006fbace7df44ac2af3675debbdcdd0675347539913139e0c2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc7183906cbb77006fbace7df44ac2af3675debbdcdd0675347539913139e0c2.exe
Resource
win10v2004-20240226-en
General
-
Target
cc7183906cbb77006fbace7df44ac2af3675debbdcdd0675347539913139e0c2
-
Size
216KB
-
MD5
1700970b42239e9f6602c70323dc8f51
-
SHA1
aa09d7293512126bc0ac2f166023daf76e0bb899
-
SHA256
cc7183906cbb77006fbace7df44ac2af3675debbdcdd0675347539913139e0c2
-
SHA512
c6b19827b3b1f1fa99158ba2baf8f80486cb22624768af38b81810fff3bd2d23da34e93dcb51f62e9a13cdec56b676b13cd592f3d53122526af7ed37ea48dcd1
-
SSDEEP
6144:JT58Ickp9xQftkiDn4X5WORxdoG7itjR:rmmxotF4XwORxdo7tjR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc7183906cbb77006fbace7df44ac2af3675debbdcdd0675347539913139e0c2
Files
-
cc7183906cbb77006fbace7df44ac2af3675debbdcdd0675347539913139e0c2.exe windows:4 windows x86 arch:x86
f8ab3bedc9c55ff17773d3ea4d797e22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
RegEnumKeyExW
CloseServiceHandle
CreateServiceW
OpenSCManagerW
DeleteService
OpenServiceW
QueryServiceStatus
StartServiceW
ControlService
EnumDependentServicesW
GetUserNameW
RegDeleteKeyW
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
comctl32
ord17
ImageList_LoadImageW
comdlg32
GetOpenFileNameW
GetSaveFileNameW
gdi32
RealizePalette
GetDIBColorTable
CreatePalette
DeleteObject
UpdateColors
DeleteDC
CreateSolidBrush
GetNearestPaletteIndex
GetPixel
ExcludeClipRect
StretchBlt
IntersectClipRect
SelectObject
CreateCompatibleDC
SelectPalette
GetObjectW
CreateHalftonePalette
RemoveFontResourceW
AddFontResourceW
GetDeviceCaps
SetBkColor
SetBkMode
SetTextColor
CreateFontIndirectW
GetStockObject
kernel32
GetLastError
MoveFileExW
FindNextFileW
FindClose
FindFirstFileW
GetProcAddress
DeleteFileW
GetEnvironmentVariableW
GetSystemDirectoryW
GetTempPathW
GetSystemTimeAsFileTime
WriteFile
CloseHandle
GlobalAddAtomW
FreeLibrary
Sleep
MoveFileW
FlushFileBuffers
CreateFileW
CompareFileTime
SystemTimeToFileTime
SetFileAttributesW
CopyFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetShortPathNameW
GetFileAttributesW
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
GetPrivateProfileSectionW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetModuleHandleA
GetTickCount
OpenProcess
GetExitCodeProcess
CreateProcessW
GetCurrentDirectoryW
ExpandEnvironmentStringsW
IsValidLocale
GetModuleFileNameW
LocalFree
LocalAlloc
GetCurrentProcess
GetWindowsDirectoryW
GetDriveTypeW
GetTimeFormatW
GetDateFormatW
GetLocalTime
HeapFree
HeapAlloc
LoadLibraryW
GetUserDefaultLangID
GetSystemDefaultLangID
SetErrorMode
MulDiv
EnumResourceNamesW
GetLocaleInfoW
SizeofResource
LockResource
LoadResource
FindResourceExW
LoadLibraryA
GlobalMemoryStatus
GetSystemInfo
WaitForSingleObject
GetCurrentThreadId
ExitProcess
GetCommandLineW
SetFileTime
SetLastError
QueryPerformanceCounter
GetVersionExW
ReadFile
RaiseException
HeapReAlloc
lstrcpyW
lstrlenW
GetStdHandle
lstrlenA
WideCharToMultiByte
GetStringTypeExW
FormatMessageW
SetFilePointer
SetEndOfFile
GetFileSize
FindResourceW
GetFileType
IsValidCodePage
GetConsoleOutputCP
GetACP
GetCPInfo
GetStartupInfoW
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
RtlUnwind
GetVersionExA
VirtualQuery
IsBadStringPtrW
IsBadStringPtrA
GetDiskFreeSpaceW
GetTempFileNameW
CreateDirectoryW
RemoveDirectoryW
GetFullPathNameW
MultiByteToWideChar
IsDBCSLeadByteEx
MapViewOfFile
CreateFileMappingW
UnmapViewOfFile
ole32
CoCreateInstance
OleUninitialize
OleInitialize
shell32
SHChangeNotify
SHGetMalloc
ShellExecuteExW
ShellExecuteW
SHGetDesktopFolder
SHGetPathFromIDListW
SHGetFileInfoW
user32
EnumWindows
IsDialogMessageW
GetWindowThreadProcessId
SetDlgItemTextW
EndDialog
SendMessageW
SetWindowTextW
EnableWindow
ShowWindow
GetWindowTextW
GetDlgItem
GetWindowTextLengthW
DefWindowProcW
CallWindowProcW
GetParent
DestroyIcon
IsWindow
LoadImageW
InvalidateRect
EndPaint
FillRect
GetSysColorBrush
GetWindowLongW
GetClientRect
BeginPaint
SetWindowLongW
ReleaseDC
GetDC
UnregisterClassW
RegisterClassW
LoadCursorW
MessageBeep
GetSysColor
SetCursor
GetWindow
GetClassInfoW
GetPropW
SetPropW
SetFocus
GetDlgCtrlID
GetSystemMetrics
AppendMenuW
GetSystemMenu
DestroyWindow
SetActiveWindow
WaitMessage
SendMessageTimeoutW
DispatchMessageW
TranslateMessage
PeekMessageW
SendDlgItemMessageW
GetDlgItemTextA
SetTimer
KillTimer
SetWindowPos
MsgWaitForMultipleObjects
SetForegroundWindow
IsWindowVisible
CharLowerW
CharUpperW
CharLowerBuffW
PostMessageW
CreateWindowExW
CreateDialogIndirectParamW
DialogBoxIndirectParamW
PostQuitMessage
LoadIconW
MessageBoxW
UnhookWindowsHookEx
RemovePropW
CallNextHookEx
SetWindowsHookExW
IsCharAlphaW
wsprintfW
SystemParametersInfoW
GetWindowRect
GetDesktopWindow
ExitWindowsEx
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_bss Size: - Virtual size: 292B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_xdata Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ