C:\Users\ani\code\squirrel\squirrel.windows\build\Release\Win32\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
012983092103921029.exe
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
012983092103921029.exe
Resource
win10v2004-20240226-es
Behavioral task
behavioral3
Sample
___.exe
Resource
win7-20240215-es
Behavioral task
behavioral4
Sample
___.exe
Resource
win10v2004-20240226-es
General
-
Target
afa124aad59bdab76f26379357ea1f5244e7c56fa283d505cf95b45285f7b1a8.zip
-
Size
2.5MB
-
MD5
4a7f711c76c752be3ecf7acc980f35f0
-
SHA1
434a1f22290af1c7d6edc8e3807808cb550c1d11
-
SHA256
afa124aad59bdab76f26379357ea1f5244e7c56fa283d505cf95b45285f7b1a8
-
SHA512
55cd1f61e026a1b94cadc9d55b8c3b40692b065b45ed77702e8298ffb01527d0d6f14e3bd83a64c89ff2479dcbb48b0be76843a40dfd2a55f703a9e475f00d0e
-
SSDEEP
49152:V5BuLlF68DvK4NkIw8UOrZ6fIPLdqJaMpX0Gup5gh1GZw+fiic6x:V/Mlg8jkOrMIdw0Gu/gPGZdx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/012983092103921029.exe
Files
-
afa124aad59bdab76f26379357ea1f5244e7c56fa283d505cf95b45285f7b1a8.zip.zip
-
012983092103921029.exe.exe windows:6 windows x86 arch:x86
e6f4169f2a5c3a8f93171d9f593bd22a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
FindResourceW
lstrlenW
GetProcAddress
GetModuleHandleW
DeleteCriticalSection
GetTempPathW
GetLastError
GetTempFileNameW
MoveFileW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
DeleteFileW
GetModuleFileNameW
GetCurrentProcess
LoadLibraryW
FreeLibrary
InitializeCriticalSectionEx
GetFileAttributesW
CreateFileW
SetFilePointer
ReadFile
VerSetConditionMask
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
FreeResource
SizeofResource
LockResource
CreateProcessW
GetSystemDirectoryW
SetDefaultDllDirectories
GetCurrentThreadId
DecodePointer
RaiseException
LeaveCriticalSection
EnterCriticalSection
lstrcmpiW
LoadLibraryExW
GetConsoleMode
GetConsoleCP
SystemTimeToFileTime
VerifyVersionInfoW
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
GetStdHandle
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
HeapSize
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
WriteConsoleW
shlwapi
PathIsUNCW
comctl32
InitCommonControlsEx
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
___.exe windows:6 windows x64 arch:x64
121f8912a67e9da4738bae806109e4ca
Code Sign
33:00:00:00:33:e5:27:86:a3:0e:4a:2a:80:00:00:00:00:00:33Certificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before27/03/2013, 20:08Not After27/06/2014, 20:08SubjectCN=Microsoft Time-Stamp Service,OU=MOPR+OU=nCipher DSE ESN:F528-3777-8A76,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
33:00:00:00:b0:11:af:0a:8b:d0:3b:9f:dd:00:01:00:00:00:b0Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before24/01/2013, 22:33Not After24/04/2014, 22:33SubjectCN=Microsoft Corporation,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:33:26:1a:00:00:00:00:00:31Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before31/08/2010, 22:19Not After31/08/2020, 22:29SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
33:00:00:00:10:0c:4d:8e:17:fe:30:96:7f:00:00:00:00:00:10Certificate
IssuerCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before13/03/2013, 20:37Not After13/06/2014, 20:37SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:0e:90:d2:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Root Certificate Authority 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before08/07/2011, 20:59Not After08/07/2026, 21:09SubjectCN=Microsoft Code Signing PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
11:ae:ca:fa:5d:47:c8:cc:5e:15:1d:37:fa:36:9d:74:c0:91:0a:22:3e:1c:9c:b2:4a:ae:66:e6:82:dc:09:3dSigner
Actual PE Digest11:ae:ca:fa:5d:47:c8:cc:5e:15:1d:37:fa:36:9d:74:c0:91:0a:22:3e:1c:9c:b2:4a:ae:66:e6:82:dc:09:3dDigest Algorithmsha256PE Digest Matchestruef4:1f:0f:f2:06:61:7e:51:17:33:7b:30:1f:63:02:1f:ae:32:b1:c1Signer
Actual PE Digestf4:1f:0f:f2:06:61:7e:51:17:33:7b:30:1f:63:02:1f:ae:32:b1:c1Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
MsMpEng.pdb
Imports
kernel32
ExitProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
mpsvc
ServiceCrtMain
Sections
.text Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ