c:\opt\jenkins\workspace\Evernote_Win6_Release_Build\winx\installer\Bootstrapper\bin\Release\Bootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
439dc989f8f56a1f35aa12e63ac5e7a715c56b2ee6a3a7e0e5e3452f28b3a0d3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
439dc989f8f56a1f35aa12e63ac5e7a715c56b2ee6a3a7e0e5e3452f28b3a0d3.exe
Resource
win10v2004-20240226-en
General
-
Target
439dc989f8f56a1f35aa12e63ac5e7a715c56b2ee6a3a7e0e5e3452f28b3a0d3
-
Size
10.0MB
-
MD5
182d259fd3dba80b302c337568ea65da
-
SHA1
0a9883edbbf4bf754a1f8e461e65130089850204
-
SHA256
439dc989f8f56a1f35aa12e63ac5e7a715c56b2ee6a3a7e0e5e3452f28b3a0d3
-
SHA512
40b52f096c11f0843d8d0950f6ad9da3b52f2dff92ef447d16d5899cfe161c212162649aa8535df0bf306c58d2bb4984bd5e023df1678cf8a5fca38e0225b550
-
SSDEEP
196608:ENRvgCw5gbOz1Ic5WVFMAz+hGj2HSVyc0jyBCGJIp70xxb2TfWd+MGNiPbwQ:ED8gGPriESU9uEJp4xx6PiDwQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 439dc989f8f56a1f35aa12e63ac5e7a715c56b2ee6a3a7e0e5e3452f28b3a0d3
Files
-
439dc989f8f56a1f35aa12e63ac5e7a715c56b2ee6a3a7e0e5e3452f28b3a0d3.exe windows:6 windows x86 arch:x86
678f8e3a74dcd33bf4c1565bce14b3eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ShellExecuteExW
ord92
SHGetSpecialFolderPathW
CommandLineToArgvW
shlwapi
PathFileExistsW
PathAddBackslashW
PathAppendW
PathCombineW
SHCopyKeyW
SHDeleteKeyW
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
kernel32
InitializeCriticalSection
SetDllDirectoryW
CreateMutexW
GetTempPathW
GetCommandLineW
DeleteFileW
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetLocaleInfoW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
SetEvent
WaitForSingleObject
ResumeThread
WideCharToMultiByte
SetLastError
GetTickCount
MoveFileExW
OpenProcess
TerminateProcess
GetCurrentProcess
LocalFree
GetCurrentProcessId
FormatMessageW
LocalAlloc
GetLocalTime
GetVersion
CreateFileW
GetFileAttributesW
GetExitCodeProcess
CreateProcessW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
Sleep
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFullPathNameW
GetCurrentDirectoryW
GetACP
WriteFile
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetDriveTypeW
LoadLibraryExW
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
VirtualFree
GetExitCodeThread
FreeResource
LockResource
FindResourceExW
CreateEventW
CloseHandle
SetEndOfFile
DecodePointer
DeleteCriticalSection
InitializeCriticalSectionEx
GetModuleFileNameW
FindResourceW
LoadResource
SizeofResource
GetLastError
GetModuleHandleW
GetProcAddress
RaiseException
ReadConsoleW
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
FreeEnvironmentStringsW
SetEnvironmentVariableA
WriteConsoleW
FlushFileBuffers
GetSystemInfo
VirtualProtect
VirtualQuery
FreeLibrary
LoadLibraryExA
MultiByteToWideChar
GetStringTypeW
EncodePointer
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
user32
GetMonitorInfoW
MonitorFromWindow
GetDlgItem
GetParent
SetActiveWindow
EnableWindow
IsWindowEnabled
InvalidateRect
EnumWindows
GetWindowRect
SetWindowPos
SetWindowTextW
SendMessageW
IsRectEmpty
IsWindow
LoadStringW
SystemParametersInfoW
MessageBoxW
EndDialog
GetActiveWindow
RegisterWindowMessageW
KillTimer
SetTimer
PostMessageW
SetWindowLongW
UnregisterClassW
ExitWindowsEx
wsprintfW
SetRect
SetRectEmpty
GetSystemMetrics
MonitorFromPoint
DialogBoxParamW
CopyRect
FindWindowW
GetWindowLongW
SendMessageTimeoutW
UpdateWindow
advapi32
OpenProcessToken
RegOpenKeyExW
GetUserNameW
RegQueryValueExW
RegOpenKeyW
RegEnumValueW
LookupPrivilegeValueW
CreateWellKnownSid
CheckTokenMembership
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
GetTokenInformation
AdjustTokenPrivileges
RegCloseKey
ole32
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoUninitialize
CoInitializeEx
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
Sections
.text Size: 331KB - Virtual size: 331KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 239.0MB - Virtual size: 239.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ