I:\build\trunk_en_3.0\package\install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
822198e6dd9b95516cc6e8d9b039d66e5ca363fcab1d813efcefc2ff756ff38c.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
822198e6dd9b95516cc6e8d9b039d66e5ca363fcab1d813efcefc2ff756ff38c.exe
Resource
win10v2004-20231215-en
General
-
Target
822198e6dd9b95516cc6e8d9b039d66e5ca363fcab1d813efcefc2ff756ff38c
-
Size
10.0MB
-
MD5
487cb0f34196858d6ebf4dd28d08cca8
-
SHA1
e81e4b7c77a39e9c6a7b0412cdea6eef7b3863c1
-
SHA256
822198e6dd9b95516cc6e8d9b039d66e5ca363fcab1d813efcefc2ff756ff38c
-
SHA512
d91eccd7c3be6a83a9707a675865beb10ee5ae7d792f9b0a83ba0362d688e1a238bb67809f842bce6bd46030fd7719caae6f7769d4b2335ca0a4bcf5c7877046
-
SSDEEP
196608:IB03xECuXuUvhVEkALskbYaD0NguHw2oB89JvLShqz:IB03xEC4rEN9sCPB89Jcqz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 822198e6dd9b95516cc6e8d9b039d66e5ca363fcab1d813efcefc2ff756ff38c
Files
-
822198e6dd9b95516cc6e8d9b039d66e5ca363fcab1d813efcefc2ff756ff38c.exe windows:5 windows x86 arch:x86
2caf5bb506e72a719786dcd604a6557b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateThread
FreeResource
CreateMutexW
GlobalFree
GlobalAlloc
GetCurrentProcessId
GetTickCount
Sleep
CreateEventW
DeviceIoControl
GetDriveTypeW
GetLogicalDriveStringsW
GetStartupInfoW
GetVersionExW
GetSystemInfo
GetPriorityClass
TerminateProcess
Module32NextW
Module32FirstW
DuplicateHandle
GetCurrentProcess
CopyFileW
CreateDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetWindowsDirectoryW
OpenProcess
GetExitCodeProcess
CreateProcessW
GetVolumeInformationW
GetDiskFreeSpaceExW
MoveFileExW
RemoveDirectoryW
FindClose
FindNextFileW
SetLastError
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
ReadFile
FreeLibrary
lstrcmpiW
GetModuleFileNameW
DecodePointer
FindFirstFileW
DeleteFileW
CreateFileW
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
FindResourceExW
FindResourceW
SizeofResource
LockResource
GetCommandLineW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetFilePointerEx
FlushFileBuffers
GetFileType
GetConsoleMode
GetConsoleCP
WriteFile
GetStdHandle
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
GetOEMCP
IsValidCodePage
GetModuleHandleExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
IsDebuggerPresent
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
LoadResource
SetProcessWorkingSetSize
WideCharToMultiByte
MultiByteToWideChar
LocalFree
SetThreadPriority
WaitForSingleObject
ResumeThread
CloseHandle
GetLastError
GetCurrentThreadId
GetStringTypeW
FindFirstFileExW
GetFileAttributesExW
GetSystemTimeAsFileTime
GetCurrentThread
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
EncodePointer
GetACP
GetFileSize
ExitProcess
MulDiv
GetLocalTime
GlobalLock
GlobalUnlock
GetUserDefaultUILanguage
CreateThread
ExitThread
LoadLibraryExW
CreateTimerQueue
IsProcessorFeaturePresent
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
user32
SetTimer
ExitWindowsEx
PostQuitMessage
ShowWindow
BringWindowToTop
PostMessageW
SendMessageW
GetWindowRect
MoveWindow
MonitorFromWindow
GetMonitorInfoW
EnableWindow
wsprintfW
SetWindowTextW
KillTimer
GetKeyState
FindWindowExW
GetGUIThreadInfo
InvalidateRgn
CreateAcceleratorTableW
GetSysColor
ClientToScreen
SetCaretPos
ShowCaret
HideCaret
CreateCaret
SetRect
FillRect
DrawTextW
CharPrevW
wvsprintfW
SetCursor
UnionRect
OffsetRect
LoadCursorW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
SetWindowPos
IsIconic
SetFocus
GetSystemMetrics
SetPropW
GetPropW
GetClientRect
GetWindowLongW
SetWindowLongW
GetParent
GetWindow
LoadImageW
DestroyWindow
GetCaretPos
CharNextW
GetActiveWindow
GetFocus
IsWindowVisible
SetCapture
ReleaseCapture
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetCursorPos
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
PtInRect
IsZoomed
SetWindowRgn
MessageBoxW
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
advapi32
RegSetValueExW
OpenProcessToken
DuplicateTokenEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
SetSecurityInfo
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyW
RegOpenKeyW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHChangeNotify
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
ord165
SHGetSpecialFolderPathW
SHGetMalloc
ole32
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoCreateInstance
wininet
InternetReadFile
HttpOpenRequestW
HttpSendRequestW
InternetCrackUrlW
HttpQueryInfoW
InternetConnectW
InternetCloseHandle
InternetOpenW
gdiplus
GdipDisposeImage
GdipCloneImage
GdipCreateLineBrushI
GdipDeleteBrush
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipGetPropertyItem
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetCompositingQuality
GdipSetSmoothingMode
GdipSetPixelOffsetMode
GdipSetTextRenderingHint
GdipCloneBrush
GdipGraphicsClear
GdipDrawImage
GdipDrawImageRectI
GdipDeleteFontFamily
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipGetFamily
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipLoadImageFromStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipSetInterpolationMode
shlwapi
PathAppendW
PathFileExistsW
version
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
EnumProcessModules
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
comctl32
ord17
_TrackMouseEvent
imm32
ImmSetCompositionFontW
ImmReleaseContext
ImmGetContext
ImmGetVirtualKey
ImmSetCompositionWindow
gdi32
SetBkMode
SetTextColor
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
SelectObject
SaveDC
RestoreDC
CreateSolidBrush
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
GetDeviceCaps
BitBlt
CreatePatternBrush
Rectangle
GetObjectA
GdiFlush
ExtTextOutW
TextOutW
MoveToEx
CombineRgn
CreatePenIndirect
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
RoundRect
SelectClipRgn
ExtSelectClipRgn
SetBkColor
StretchBlt
SetStretchBltMode
CreateDIBSection
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
Sections
.text Size: 880KB - Virtual size: 879KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 234KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 332.8MB - Virtual size: 332.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ