ie4uinit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dde4bfaeed17e24c117474dd3ac3b948.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dde4bfaeed17e24c117474dd3ac3b948.exe
Resource
win10v2004-20240226-en
General
-
Target
dde4bfaeed17e24c117474dd3ac3b948
-
Size
233KB
-
MD5
dde4bfaeed17e24c117474dd3ac3b948
-
SHA1
12e78c4296063dc7b6eea8e0c03cd4f81c4cf929
-
SHA256
3a7a8a07c15b1b2a6fb1202d06f21e9dc4ef02eaf75b274c0cc5069778c8b7d2
-
SHA512
8e33a2dc84c9c0d8ba82155733a7bf6df93ac3bd9db6ba5ac85b10217db10df196a3e0100de357db49047da85b1ca64616a4c19f1c413db270aaf14075e97c4a
-
SSDEEP
6144:ICqNK5zcl/Uyy6Dbf1Ja2QM7F1L4E7ekO:F5z88Ji1fHjxtO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dde4bfaeed17e24c117474dd3ac3b948
Files
-
dde4bfaeed17e24c117474dd3ac3b948.exe windows:6 windows x86 arch:x86
3664d577155e1cada9941215033aa98b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegEnumValueW
RegOpenKeyExW
RegSetValueW
RegDeleteKeyW
kernel32
GetProcAddress
LoadLibraryW
lstrlenW
GetLastError
GetEnvironmentVariableW
GetVersion
GetModuleHandleW
SetErrorMode
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindClose
FindNextFileW
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
Sleep
GetTickCount
lstrcmpW
FindFirstFileExW
GetShortPathNameW
GetSystemDefaultUILanguage
CreateDirectoryW
CloseHandle
CreateProcessW
LocalFree
LocalAlloc
CreateFileW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetPrivateProfileStringW
GetNativeSystemInfo
FindResourceExW
FreeLibrary
GetSystemDirectoryW
GetVersionExW
GetModuleFileNameW
LoadResource
SetLastError
LoadLibraryExW
MapViewOfFile
CreateFileMappingW
GetLocaleInfoW
GetModuleHandleA
UnmapViewOfFile
GetUserDefaultUILanguage
SearchPathW
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
MessageBoxW
LoadStringW
GetShellWindow
PostMessageW
GetMenuItemInfoW
GetMenuItemCount
DestroyMenu
CreatePopupMenu
SendInput
GetCursorPos
SystemParametersInfoW
PostQuitMessage
SetWinEventHook
KillTimer
DispatchMessageW
GetMessageW
SetTimer
UnhookWinEvent
BlockInput
msvcrt
_vsnwprintf
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
_time64
_controlfp
?terminate@@YAXXZ
memcpy
__set_app_type
__p__fmode
wcsncmp
_wcsnicmp
_wcsicmp
bsearch
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
ntdll
RtlUnwind
shell32
ord165
ord526
SHChangeNotify
SHGetSpecialFolderLocation
SHSetLocalizedName
ord155
SHGetDesktopFolder
ord190
SHGetSpecialFolderPathW
SHBindToParent
SHParseDisplayName
ole32
OleUninitialize
OleInitialize
CoTaskMemFree
PropVariantClear
CoCreateInstance
CoUninitialize
CoInitializeEx
advpack
RunSetupCommandW
ExecuteCabW
RegRestoreAllW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
SHRegGetValueW
SHRegSetUSValueW
SHDeleteKeyW
ord225
PathRemoveExtensionW
PathAddExtensionW
PathRemoveBlanksW
SHDeleteValueW
SHSetValueW
StrCmpIW
SHGetValueW
SHStrDupW
PathAppendW
PathRemoveFileSpecW
SHCopyKeyW
StrCmpNIW
PathFileExistsW
PathCombineW
PathAddBackslashW
ord437
ord158
StrStrIW
PathFindFileNameW
iertutil
ord33
ord37
ord654
ord650
oleacc
AccessibleObjectFromEvent
oleaut32
SysFreeString
VariantClear
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
puiegcv Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
utjhdgf Size: 3KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE