D:\projects\standalone_distrib\testing\windows-setup\starter\starter\Release\setup-starter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6d1ceea5f194231a843428f5e8b6603de345782cefdf49ec60f4774eafc250f2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6d1ceea5f194231a843428f5e8b6603de345782cefdf49ec60f4774eafc250f2.exe
Resource
win10v2004-20240226-en
General
-
Target
6d1ceea5f194231a843428f5e8b6603de345782cefdf49ec60f4774eafc250f2
-
Size
6.8MB
-
MD5
eda532deacf3f1e72a5bf0dd786cd7c1
-
SHA1
110f6c03d6c0e1757e289380609544bd45ed71a2
-
SHA256
6d1ceea5f194231a843428f5e8b6603de345782cefdf49ec60f4774eafc250f2
-
SHA512
56f370392d8f7cad0a1ba48c3f9ffca12f9e6c370168568fb79d7e2ab5de142f949e1bfcdbe29934858675f6b384e4eb7776ac965a0891ecfcbed2486986e27d
-
SSDEEP
98304:rfIKy6ALS8GzJkFHy706iFIhcbxyT5XdJOyj2+q9/V9qhck8rznE:iLS8OJi6iFIWGJO9+q9KhF8rzE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6d1ceea5f194231a843428f5e8b6603de345782cefdf49ec60f4774eafc250f2
Files
-
6d1ceea5f194231a843428f5e8b6603de345782cefdf49ec60f4774eafc250f2.exe windows:5 windows x86 arch:x86
5809f802dfd23203b66c8434806363c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtect
GetProcAddress
GetModuleHandleW
VirtualQuery
GetVersionExW
SetLastError
GetHandleInformation
RemoveDirectoryW
GetUserDefaultLangID
WaitForMultipleObjects
WaitForSingleObject
CreateFileW
CreateEventW
GetLastError
SetEvent
CloseHandle
CreateProcessW
GetTickCount
GetExitCodeProcess
DeviceIoControl
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
RaiseException
ResetEvent
DecodePointer
DeleteCriticalSection
FindResourceExW
LoadResource
CreateDirectoryW
ReadFile
SizeofResource
FindFirstFileW
HeapFree
VirtualFree
FindNextFileW
GetCurrentProcess
WriteFile
ExpandEnvironmentStringsW
GetShortPathNameW
VirtualAlloc
TerminateProcess
GetModuleFileNameW
SetEndOfFile
GetTempPathW
FindClose
GetFileAttributesW
GetSystemDirectoryW
UnmapViewOfFile
FreeResource
SetFileAttributesW
MultiByteToWideChar
LockResource
DeleteFileW
FindResourceW
HeapAlloc
GetWindowsDirectoryW
SetFilePointerEx
MoveFileExW
GetFileSize
GetProcessHeap
WideCharToMultiByte
GetFileType
CreateFileMappingW
MapViewOfFile
FlushFileBuffers
Sleep
SetFilePointer
MapViewOfFileEx
FlushViewOfFile
GetCurrentProcessId
LocalAlloc
LocalFree
LoadLibraryW
FreeLibrary
FormatMessageW
lstrlenW
LocalSize
GetSystemInfo
LoadLibraryExW
HeapReAlloc
HeapSize
GetCurrentThread
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
FindFirstFileExW
GetFileAttributesExW
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThreadId
GetExitCodeThread
EncodePointer
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RestoreLastError
OutputDebugStringW
FormatMessageA
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
ExitThread
GetModuleHandleExW
GetStdHandle
ExitProcess
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
LoadLibraryExA
CreateFileMappingA
MoveFileW
Sections
.text Size: 668KB - Virtual size: 668KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ