B:\matlab\toolbox\compiler\win64\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
BreakpointChlorinationSimulator_Installer_web.exe
Resource
win10v2004-20240226-en
General
-
Target
BreakpointChlorinationSimulator_Installer_web.exe
-
Size
3.3MB
-
MD5
8aae89f95aebbef080668932de8df34d
-
SHA1
534573131f8d2730868eb7293b756cb98e8a9790
-
SHA256
eda54966aa5a5b2d1b89027aebefdcf6e0d5c09430bf39dc3742300d10962770
-
SHA512
6feb1b985969678e3aff79f70a5f36fb7221aff6403d7ba8f57c9d02446a2cce9781a061479e7505725dff9bf22bed1be22b08a4daeafa937846f48593826060
-
SSDEEP
49152:ST9UB43g7Xy+67cwc/K78Cu1SqunvwzJ41on9JTUxTNnzl5ZZgn5Cwy1mkJXGmZq:1t7RvHCESTnvivu5SY1mkJXGmZkxR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BreakpointChlorinationSimulator_Installer_web.exe
Files
-
BreakpointChlorinationSimulator_Installer_web.exe.exe windows:6 windows x64 arch:x64
4ec1cdd3d4ed7d190448db64379e64da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
wininet
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetQueryOptionW
InternetSetOptionW
HttpOpenRequestW
HttpSendRequestW
HttpQueryInfoW
InternetCrackUrlW
InternetErrorDlg
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
PathRemoveExtensionW
gdiplus
GdipFree
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipAlloc
GdipDisposeImage
GdiplusStartup
GdiplusShutdown
GdipCloneImage
gdi32
GetDeviceCaps
kernel32
OutputDebugStringW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
HeapSize
WriteConsoleW
IsValidCodePage
SetEndOfFile
FindFirstFileExW
FindClose
GetTimeZoneInformation
SetConsoleCtrlHandler
HeapReAlloc
ReadConsoleW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
EnumSystemLocalesW
FindNextFileW
GetStringTypeW
GetCommandLineW
LocalFree
AttachConsole
CloseHandle
GetLastError
WaitForSingleObject
CreateThread
TerminateThread
GetExitCodeThread
GetModuleHandleW
MulDiv
CreateDirectoryW
CreateFileW
WriteFile
GetTempPathW
GetExitCodeProcess
CreateProcessW
GetModuleFileNameW
LoadResource
LockResource
SizeofResource
FindResourceW
FormatMessageA
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFullPathNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
HeapFree
HeapAlloc
GetCurrentThread
GetStdHandle
GetModuleHandleExW
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
LoadLibraryExW
FreeLibrary
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwindEx
RaiseException
RtlPcToFileHeader
TerminateProcess
GetCurrentProcess
InitializeSListHead
GetCurrentThreadId
FormatMessageW
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetProcAddress
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
user32
GetWindowRect
SetWindowTextW
ReleaseDC
GetDC
SetForegroundWindow
GetSystemMetrics
SetDlgItemTextW
MapWindowPoints
CreateDialogParamW
SetWindowPos
MoveWindow
ShowWindow
DestroyWindow
SendMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
GetDesktopWindow
SetProcessDPIAware
LoadIconW
IsDialogMessageW
SystemParametersInfoW
MessageBoxA
GetDlgItem
shell32
SHFileOperationW
CommandLineToArgvW
ord47
Sections
.text Size: 720KB - Virtual size: 720KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ