download
download_quiet
Overview
overview
10Static
static
3c7b1aa8654...ba.exe
windows7-x64
7c7b1aa8654...ba.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$TEMP/windll.dll
windows7-x64
10$TEMP/windll.dll
windows10-2004-x64
10$TEMP/zip-....1.exe
windows7-x64
7$TEMP/zip-....1.exe
windows10-2004-x64
7Static task
static1
Behavioral task
behavioral1
Sample
c7b1aa865454d03d2e862922db020aba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7b1aa865454d03d2e862922db020aba.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$TEMP/windll.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$TEMP/windll.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$TEMP/zip-repair-sanmaxi-6.0.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$TEMP/zip-repair-sanmaxi-6.0.1.exe
Resource
win10v2004-20231215-en
Target
c7b1aa865454d03d2e862922db020aba
Size
1.2MB
MD5
c7b1aa865454d03d2e862922db020aba
SHA1
50a9fab2fc40a0767e7354e5475b9bcb7a90ee16
SHA256
e0d1157e408d3867c112422a1731cb51ae143fc943a5e44c263cba771b3d3c29
SHA512
d913b1a722c79108fefd694e25653bb698f4a7a55dc1f99f978b7ed77a2e86d9a16d4af1ecb60c115543679d4116ba7188ef6768a1084895c50bf4abe33df783
SSDEEP
24576:Prqb74olrzk2/RZhl2ViBeoVdvOKNbPaaOl1Ml34XNXUOpL5wrpE2V16d:m3/8hoVwKN+pcloLpLoprw
Checks for missing Authenticode signature.
resource |
---|
c7b1aa865454d03d2e862922db020aba |
unpack001/$PLUGINSDIR/NSISdl.dll |
unpack001/$TEMP/windll.dll |
unpack001/$TEMP/zip-repair-sanmaxi-6.0.1.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkColor
SetBkMode
SetTextColor
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExA
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
FindWindowExA
GetClassInfoA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
wsprintfA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateSemaphoreA
CreateThread
DeleteFileA
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
GlobalAlloc
GlobalFree
InterlockedDecrement
InterlockedIncrement
MulDiv
ReleaseSemaphore
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
_write
__dllonexit
_errno
_iob
abort
fflush
fputc
fputs
free
fwrite
malloc
memcpy
realloc
strcmp
strcpy
strlen
CallWindowProcA
CharPrevA
CreateWindowExA
DestroyWindow
EnableWindow
FindWindowExA
GetClientRect
GetDlgItem
GetFocus
GetWindowLongA
GetWindowRect
IsWindowVisible
RegisterWindowMessageA
SendMessageA
SetDlgItemTextA
SetWindowLongA
SetWindowTextA
ShowWindow
wsprintfA
WSACleanup
WSAGetLastError
WSAStartup
__WSAFDIsSet
closesocket
connect
gethostbyname
getsockname
htons
inet_addr
ioctlsocket
recv
select
send
shutdown
socket
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
CreateMutexA
DeleteFileA
GetLastError
GetModuleHandleA
GetProcAddress
LoadLibraryA
GlobalAlloc
GetProcessHeap
CreateFileA
MoveFileA
MapViewOfFile
GetModuleFileNameA
ReadFile
LeaveCriticalSection
VirtualQuery
EnterCriticalSection
CreateThread
CreateFileMappingA
InterlockedDecrement
GetComputerNameA
InterlockedExchange
CreateProcessA
CloseHandle
ReleaseMutex
VirtualProtect
HeapAlloc
LocalFree
GetSystemTimeAsFileTime
WaitForSingleObject
CreateDirectoryA
GetTickCount
GetConsoleCP
GlobalFindAtomA
HeapUnlock
OpenProcess
GetSystemDirectoryA
SetCurrentDirectoryA
LocalLock
GetLongPathNameW
DeleteTimerQueueTimer
lstrlenW
SystemTimeToFileTime
FindCloseChangeNotification
GetWindowsDirectoryA
GetStringTypeA
FindClose
GetTempPathW
CreateProcessW
GetSystemPowerStatus
CreateNamedPipeA
RegisterWaitForSingleObject
OpenFileMappingA
GetDefaultCommConfigW
UpdateResourceA
ReadConsoleW
WriteConsoleA
QueueUserWorkItem
GetVolumePathNameW
SetLastError
GetCurrentDirectoryW
HeapReAlloc
TerminateJobObject
lstrcpyA
ReleaseSemaphore
GetTempFileNameW
SetCurrentDirectoryW
FindNextFileW
OpenSemaphoreW
FlushFileBuffers
FlushConsoleInputBuffer
DuplicateHandle
HeapLock
GetNumberFormatW
GetThreadPriority
RegisterWaitForSingleObjectEx
GetShortPathNameW
GetModuleHandleExW
SetWaitableTimer
GetFullPathNameW
CreateDirectoryW
WaitForMultipleObjectsEx
VirtualAlloc
GetEnvironmentStrings
CreateMailslotW
VerLanguageNameW
IsBadCodePtr
FreeResource
VirtualQueryEx
InterlockedExchangeAdd
GetProfileIntA
GetCurrentProcess
GetHandleInformation
GlobalGetAtomNameW
lstrcatW
PulseEvent
LocalAlloc
ExitProcess
GetDriveTypeW
IsWow64Process
lstrcmpW
SetEnvironmentVariableA
CompareFileTime
SetConsoleCtrlHandler
OpenEventW
ExpandEnvironmentStringsW
CopyFileExW
GetVolumeNameForVolumeMountPointW
IsValidLanguageGroup
IsBadWritePtr
LocalReAlloc
GetAtomNameA
GetUserDefaultLangID
SetFilePointer
GetAtomNameW
CreateWaitableTimerA
ReplaceFileW
GetLogicalDriveStringsA
IsBadHugeReadPtr
GetEnvironmentVariableW
BindIoCompletionCallback
WideCharToMultiByte
GetFileSizeEx
FindFirstFileExW
CreateConsoleScreenBuffer
GetComputerNameW
CreateToolhelp32Snapshot
ExitThread
SetFileAttributesA
GetSystemWow64DirectoryW
GetStartupInfoW
SearchPathW
MoveFileExA
GetVersionExW
PeekNamedPipe
LocalFlags
CreateRemoteThread
RtlMoveMemory
GlobalMemoryStatus
WaitForSingleObjectEx
FindResourceA
GetFileAttributesExA
GetCurrentDirectoryA
GetCompressedFileSizeW
IsBadReadPtr
CreateFileW
CoGetClassObject
CoInitializeEx
CoSwitchCallContext
OleLoadFromStream
CoGetMarshalSizeMax
OleGetAutoConvert
OleRegGetMiscStatus
StringFromGUID2
CreateOleAdviseHolder
CoFileTimeNow
StgCreateDocfile
OleDestroyMenuDescriptor
CoTaskMemRealloc
CoCreateInstanceEx
CoWaitForMultipleHandles
FreePropVariantArray
OleCreateLinkFromData
CreateGenericComposite
OleCreateMenuDescriptor
MkParseDisplayName
OleCreateStaticFromData
CreateAntiMoniker
CreateDataAdviseHolder
OleCreateLink
CoUnmarshalInterface
CoReleaseMarshalData
OleCreate
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoMarshalInterThreadInterfaceInStream
DeferWindowPos
GetMenuItemRect
GetMenuItemInfoA
RegisterHotKey
UnpackDDElParam
LoadMenuA
DestroyIcon
DrawStateA
GrayStringA
DrawFocusRect
SetTimer
GetProcessDefaultLayout
GetScrollPos
LookupIconIdFromDirectory
CreateDialogIndirectParamW
AdjustWindowRectEx
MonitorFromWindow
AppendMenuW
ToAsciiEx
IsWindowEnabled
SetCursor
OemToCharBuffA
LoadBitmapW
SendMessageW
UpdateWindow
MessageBoxExW
GetCapture
LoadAcceleratorsA
SetThreadDesktop
GetParent
GetWindowInfo
IsRectEmpty
EnableWindow
SetMenuDefaultItem
SetMessageQueue
GetWindowTextW
ChangeDisplaySettingsW
CallMsgFilterW
GetMenuCheckMarkDimensions
GetUpdateRect
SetActiveWindow
GetSysColor
GetCursorPos
IsDialogMessageW
EnumDisplaySettingsW
VkKeyScanA
SetDlgItemTextA
WaitForInputIdle
SetWindowPos
GetDlgItemInt
GetMessageExtraInfo
CharToOemA
DialogBoxParamW
SetWindowWord
EnableScrollBar
CloseWindowStation
GetUserObjectInformationW
GetMenuStringA
MessageBoxIndirectA
AllowSetForegroundWindow
CharToOemW
LoadImageA
InsertMenuItemA
ValidateRect
PtInRect
IsDlgButtonChecked
CreateAcceleratorTableA
IsIconic
ScreenToClient
IsCharAlphaA
ShowCaret
LoadIconA
ReleaseCapture
GetMenuItemID
EndPaint
CallWindowProcA
UnhookWindowsHook
PeekMessageW
ToAscii
MoveWindow
MessageBeep
GetDlgCtrlID
InSendMessage
GetIconInfo
BeginDeferWindowPos
GetScrollBarInfo
WindowFromPoint
EnumDesktopsW
DefFrameProcW
GetAncestor
GetLastActivePopup
GetUserObjectInformationA
ShowWindowAsync
WindowFromDC
OpenInputDesktop
GetSystemMenu
GetWindowRect
LoadCursorW
SetForegroundWindow
GetWindowTextA
UnregisterHotKey
DispatchMessageW
GetClassInfoW
IsMenu
GetClassNameW
RegisterClassExA
UnhookWindowsHookEx
DefWindowProcA
GetMessageA
SendMessageA
PeekMessageA
CallNextHookEx
GetWindowLongA
FindWindowA
GetClassNameA
DispatchMessageA
GetClientRect
SetWindowsHookExA
CreateWindowExA
GetMessagePos
CharNextA
SHAutoComplete
StrToIntW
SHDeleteKeyW
SHRegGetBoolUSValueW
StrTrimW
PathStripToRootW
PathIsUNCServerShareW
StrStrIA
StrCpyNW
PathFindFileNameA
PathRemoveFileSpecA
StrCmpNW
PathCommonPrefixW
PathGetCharTypeW
StrCmpIW
PathIsNetworkPathW
PathRemoveExtensionW
UrlCombineW
StrToIntA
UrlEscapeW
PathFindFileNameW
PathIsRootW
StrFormatByteSizeW
SHRegSetUSValueW
StrDupW
SHStrDupW
wvnsprintfW
PathRenameExtensionW
SHSetValueA
StrRetToStrW
UrlUnescapeW
SHDeleteKeyA
PathIsFileSpecW
PathSkipRootW
ShellExecuteExW
DragFinish
DragAcceptFiles
SHGetInstanceExplorer
SHBindToParent
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
ShellAboutW
SHGetSpecialFolderPathW
SHPathPrepareForWriteW
SHCreateShellItem
SHGetSettings
SHGetSpecialFolderLocation
SHGetFolderPathA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ