C:\a\c\g_NYV6T3SE\r\product\removal_tools\output\out_Win32\Release\setup_kvrt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
76adb52e34741bf15a4455933b620a0042dc6671ecd6de25c69c152a3f8ee818.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
76adb52e34741bf15a4455933b620a0042dc6671ecd6de25c69c152a3f8ee818.exe
Resource
win10v2004-20240226-en
General
-
Target
76adb52e34741bf15a4455933b620a0042dc6671ecd6de25c69c152a3f8ee818
-
Size
4.4MB
-
MD5
c7fb072dba97e2a6deec280ac58527c9
-
SHA1
4ac0adca443d9b668966cc73f02e41473fd82b82
-
SHA256
76adb52e34741bf15a4455933b620a0042dc6671ecd6de25c69c152a3f8ee818
-
SHA512
ae7140ba9b10162389a6d8cd3875812704c4e51b18156b04ec280fb48f8d66643991fd2aecc4b2e056594ce6df3fcffcb53537ba9e5c78f131c79c098c68fd41
-
SSDEEP
98304:W6JMzwVXx9YwvP0VtscZIg55MdUckLKGYaj8JA5:JrV3HX2xZIRzkL/YaB5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76adb52e34741bf15a4455933b620a0042dc6671ecd6de25c69c152a3f8ee818
Files
-
76adb52e34741bf15a4455933b620a0042dc6671ecd6de25c69c152a3f8ee818.exe windows:5 windows x86 arch:x86
868dc92668ff4b0d0241716d6769d9c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
LocalFree
ReadFile
GetFileSizeEx
GetCurrentProcess
WriteFile
SetFileTime
SetEndOfFile
GetTempPathW
CreateFileW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
SetFilePointerEx
GetFileTime
FlushFileBuffers
CreateDirectoryW
GetVolumeInformationW
FindFirstFileExW
GetFullPathNameW
FindNextFileW
RemoveDirectoryW
FindClose
GetModuleHandleA
GetDiskFreeSpaceExW
GetCurrentDirectoryW
GetDriveTypeW
GetSystemDefaultLangID
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetModuleHandleExW
GetVersionExW
GetSystemWindowsDirectoryA
GetTimeZoneInformation
FileTimeToSystemTime
LoadLibraryA
RaiseException
GetSystemInfo
FileTimeToLocalFileTime
DecodePointer
GetWindowsDirectoryW
VerSetConditionMask
GetComputerNameW
SystemTimeToFileTime
VerifyVersionInfoW
GetSystemWindowsDirectoryW
ProcessIdToSessionId
GetCurrentProcessId
CreateEventW
SetEvent
GetStartupInfoW
WaitForMultipleObjects
WaitForSingleObject
GetCommandLineW
CopyFileW
AttachConsole
FreeLibrary
Sleep
GetTickCount
SizeofResource
LockResource
LoadResource
FindResourceW
GetOEMCP
GetACP
IsValidCodePage
PeekNamedPipe
GetFileType
GetExitCodeProcess
OpenProcess
SetHandleInformation
GetStdHandle
CreatePipe
DuplicateHandle
SearchPathA
CreateProcessA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapSize
ExitProcess
SetStdHandle
GetConsoleCP
ExitThread
RtlUnwind
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
SetEnvironmentVariableA
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
ReadConsoleW
GetConsoleMode
VirtualFree
VirtualProtect
VirtualAlloc
LoadLibraryExW
GetModuleFileNameW
FreeLibraryAndExitThread
CreateSemaphoreW
GetModuleHandleW
GetProcAddress
HeapDestroy
CloseHandle
HeapReAlloc
WaitForSingleObjectEx
GetLastError
GetCurrentThreadId
ReleaseSemaphore
HeapCreate
GetProcessHeap
DeleteCriticalSection
HeapAlloc
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
WriteConsoleW
CreateProcessW
TryEnterCriticalSection
SwitchToThread
GetCurrentThread
GetExitCodeThread
QueryPerformanceCounter
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
InitializeSListHead
OutputDebugStringW
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
user32
GetWindowRect
PostMessageW
WaitForInputIdle
MessageBoxW
SendMessageW
EndDialog
IsWindow
MessageBoxA
MoveWindow
GetClientRect
GetDlgItem
DialogBoxParamW
GetSystemMetrics
SetWindowPos
SetWindowTextW
shell32
CommandLineToArgvW
ole32
CoCreateGuid
CoInitializeSecurity
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
SysAllocString
SysStringLen
VariantClear
VariantInit
advapi32
RegCloseKey
RegOpenKeyExW
GetUserNameW
RegQueryValueExW
SetSecurityDescriptorDacl
SetFileSecurityW
ConvertSecurityDescriptorToStringSecurityDescriptorW
CreateWellKnownSid
SetSecurityDescriptorSacl
IsValidSecurityDescriptor
OpenProcessToken
GetFileSecurityW
InitializeSecurityDescriptor
InitializeAcl
AddAccessAllowedAceEx
GetTokenInformation
Sections
.text Size: 657KB - Virtual size: 656KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100.9MB - Virtual size: 100.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ