X:\project\installer\setup-3\Release\SetupProxyCommon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ccad48bb91f792803901251d581d0b9fb1621cc58783d42d944a3adab9e6defa.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ccad48bb91f792803901251d581d0b9fb1621cc58783d42d944a3adab9e6defa.exe
Resource
win10v2004-20240226-en
General
-
Target
ccad48bb91f792803901251d581d0b9fb1621cc58783d42d944a3adab9e6defa
-
Size
4.8MB
-
MD5
91a49115bcdd304f82c919aa0e404b14
-
SHA1
c6abdff4b78ed1ca85144708a9594d92f131077e
-
SHA256
ccad48bb91f792803901251d581d0b9fb1621cc58783d42d944a3adab9e6defa
-
SHA512
1994abd22b575c6df0ff812516decf79f55549fcc3398f2032d4e52a2a0c15d69fa50c3a46214980391217f00d07828dd6901877f4a780ac3fabfa7fbaac6f13
-
SSDEEP
98304:l6KfH1CJK4IpN3oZia7kHgxdzDa5EgaSvSYJM2vRc9qX:l6KfHgJKppC5kAxdzDg45YJMzk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccad48bb91f792803901251d581d0b9fb1621cc58783d42d944a3adab9e6defa
Files
-
ccad48bb91f792803901251d581d0b9fb1621cc58783d42d944a3adab9e6defa.exe windows:5 windows x86 arch:x86
98a2b0a2caf9fbb6919a50eaa5424830
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
powrprof
SetSuspendState
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
lstrcmpiW
MulDiv
GetPrivateProfileIntW
OutputDebugStringA
GetModuleFileNameA
GetTempPathA
CreateDirectoryA
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
DeleteFileA
FindFirstFileA
FindNextFileA
CreateFileA
GetDiskFreeSpaceA
GetDriveTypeA
GetFileSize
SetFileAttributesW
SetFilePointer
DeviceIoControl
GetWindowsDirectoryA
GetModuleHandleA
GetShortPathNameA
QueryDosDeviceA
CopyFileA
MoveFileA
MoveFileW
MoveFileExA
MoveFileExW
GetVolumeInformationA
CreateEventA
SetEvent
CreateProcessA
GetSystemDirectoryA
GetVersionExA
GetNativeSystemInfo
GlobalLock
GlobalUnlock
IsDBCSLeadByte
GetSystemTimeAsFileTime
lstrlenA
GetFileAttributesW
QueryPerformanceCounter
WaitForSingleObjectEx
GetStdHandle
WriteFile
FreeConsole
SetConsoleTitleA
AllocConsole
RemoveDirectoryW
SetConsoleMode
GetDiskFreeSpaceExA
FindResourceW
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
OutputDebugStringW
GetTimeZoneInformation
VirtualQuery
FindFirstFileExW
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
ReadConsoleW
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
HeapSize
GetModuleHandleW
LoadLibraryW
LoadLibraryA
GetTickCount
GetStringTypeW
GetSystemInfo
CloseHandle
FindClose
SizeofResource
LoadResource
Sleep
GetLastError
GetCurrentThreadId
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
OpenProcess
GetProcAddress
FreeLibrary
LockResource
WaitForSingleObject
CreateDirectoryW
GetTempPathW
GetModuleFileNameW
GetCommandLineW
GetDiskFreeSpaceW
GlobalMemoryStatus
EncodePointer
GetModuleHandleExW
ExitProcess
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetConsoleMode
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LoadLibraryExW
GetFileInformationByHandle
SetEndOfFile
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
HeapReAlloc
ExitThread
CreateThread
SystemTimeToTzSpecificLocalTime
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
ReadFile
RaiseException
GetCommandLineA
DecodePointer
FileTimeToSystemTime
HeapAlloc
HeapFree
LocalFree
FormatMessageA
FormatMessageW
SetConsoleCtrlHandler
GetProcessTimes
SetFileApisToOEM
GetConsoleScreenBufferInfo
AreFileApisANSI
SetProcessAffinityMask
MapViewOfFile
UnmapViewOfFile
OpenEventA
OpenFileMappingA
VirtualAlloc
VirtualFree
FileTimeToDosDateTime
CompareFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FileTimeToLocalFileTime
SetLastError
SetFileTime
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
InitializeCriticalSection
GetLogicalDriveStringsA
GetLogicalDriveStringsW
user32
CharUpperW
MessageBoxW
PostMessageW
ExitWindowsEx
wsprintfW
LoadStringA
FindWindowW
CharUpperA
GetWindowThreadProcessId
CharNextA
SystemParametersInfoA
GetDesktopWindow
GetForegroundWindow
GetSystemMetrics
IsClipboardFormatAvailable
GetClipboardData
CloseClipboard
OpenClipboard
IsWindowVisible
SetWindowPos
PostMessageA
CloseDesktop
EnumDesktopWindows
OpenDesktopA
GetDC
CharLowerW
gdi32
CreateFontIndirectW
GetDeviceCaps
advapi32
AdjustTokenPrivileges
GetFileSecurityW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegSetValueA
RegQueryValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyA
LookupPrivilegeValueA
RegQueryInfoKeyA
RegOpenKeyA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
CheckTokenMembership
DuplicateTokenEx
LookupPrivilegeValueW
FreeSid
AllocateAndInitializeSid
OpenProcessToken
SetFileSecurityW
shell32
SHGetPathFromIDListA
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteW
ShellExecuteA
ShellExecuteExA
ole32
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
oleaut32
VariantClear
SysFreeString
SysAllocString
SysStringLen
SysAllocStringLen
VariantCopy
shlwapi
StrCpyNW
StrChrW
PathAppendW
PathRemoveFileSpecW
PathAppendA
StrCpyW
StrCmpW
StrCatW
StrRChrW
PathFileExistsW
PathFileExistsA
netapi32
NetApiBufferFree
NetWkstaGetInfo
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
dbghelp
MiniDumpWriteDump
Sections
.text Size: 570KB - Virtual size: 570KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 799KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ