d:\workspace\installer\setup\Release\R_Online.pdb
Static task
static1
Behavioral task
behavioral1
Sample
095dd6d06aae4638ed5e8f15540f070109514103aab68b326d3c9d40b670c533.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
095dd6d06aae4638ed5e8f15540f070109514103aab68b326d3c9d40b670c533.exe
Resource
win10v2004-20240412-en
General
-
Target
095dd6d06aae4638ed5e8f15540f070109514103aab68b326d3c9d40b670c533
-
Size
4.8MB
-
MD5
57a7c93179a69cacf0b2470f4f801031
-
SHA1
96ba1559bffaf0cffca98d7a61a6c867fb199b57
-
SHA256
095dd6d06aae4638ed5e8f15540f070109514103aab68b326d3c9d40b670c533
-
SHA512
ab4aa84eb1c9082a726abad170cfada6e0a84d35704d5f423f8b3ff286807b9bdc30b987d627fe42d46c980d7a4997797f445c500c220bb64f0dbf655a234632
-
SSDEEP
98304:F/prYm7kEShZJO5JpGFJMW5I8R2cc5Ulcg:F/dkDhK5JcFJt7ccc5Ulcg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 095dd6d06aae4638ed5e8f15540f070109514103aab68b326d3c9d40b670c533
Files
-
095dd6d06aae4638ed5e8f15540f070109514103aab68b326d3c9d40b670c533.exe windows:5 windows x86 arch:x86
340f6580b1b61f91fe36fd39ac6b0331
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
ioctlsocket
gethostname
shutdown
htonl
getservbyname
WSAGetLastError
gethostbyname
sendto
recvfrom
inet_ntoa
inet_addr
WSACleanup
accept
listen
WSAStartup
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAWaitForMultipleEvents
WSASocketW
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
wldap32
ord301
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord143
ord200
kernel32
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
GetCPInfo
DeleteFileW
Sleep
GetExitCodeProcess
CloseHandle
TerminateProcess
GetTickCount
GetPrivateProfileIntW
WaitForSingleObject
LoadLibraryA
GetProcAddress
FreeLibrary
FindFirstFileW
FindNextFileW
GetFileAttributesW
SetFileAttributesW
GetCurrentDirectoryW
WideCharToMultiByte
OpenFileMappingW
MapViewOfFile
GetLastError
CreateFileMappingW
UnmapViewOfFile
MulDiv
SetUnhandledExceptionFilter
OutputDebugStringW
MoveFileExW
OutputDebugStringA
DeleteFileA
GetCommandLineW
CreateDirectoryW
LoadLibraryW
VirtualAlloc
VirtualFree
GetModuleHandleA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
CreateEventA
CreateSemaphoreA
AreFileApisANSI
MultiByteToWideChar
LoadLibraryExW
GetModuleFileNameA
GetModuleFileNameW
LocalFree
FormatMessageA
FormatMessageW
GetCurrentProcessId
GetCurrentThreadId
SetLastError
SetFileTime
GetModuleHandleW
GetSystemDirectoryA
GetTempPathA
GetTempPathW
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
CreateDirectoryA
RemoveDirectoryA
RemoveDirectoryW
CreateFileW
SetFileAttributesA
MoveFileA
MoveFileW
FindClose
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetFileAttributesA
FindFirstFileA
FindNextFileA
GetFileSize
SetStdHandle
ReadFile
DeviceIoControl
SetEndOfFile
SetFilePointer
CreateFileA
GetFileInformationByHandle
GetDriveTypeW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetCurrentProcess
CompareFileTime
FileTimeToSystemTime
GlobalMemoryStatus
GetSystemInfo
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
WaitForMultipleObjects
GetStdHandle
QueryPerformanceCounter
SetProcessAffinityMask
OpenEventA
OpenFileMappingA
GetProcessTimes
SetConsoleCtrlHandler
SetFileApisToOEM
GetConsoleScreenBufferInfo
GetConsoleMode
SetConsoleMode
OpenProcess
lstrcmpiW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LockResource
LoadResource
SizeofResource
FindResourceW
GetDiskFreeSpaceExA
GetVersionExW
GetSystemDefaultLangID
GetLocaleInfoA
ReleaseMutex
CreateMutexW
GetLocalTime
SystemTimeToFileTime
InitializeCriticalSectionEx
SleepEx
GetTickCount64
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
PeekNamedPipe
VerSetConditionMask
VerifyVersionInfoA
FlushConsoleInputBuffer
GetSystemTime
GetModuleHandleExW
ExitProcess
ReadConsoleInputA
SetFilePointerEx
HeapReAlloc
RaiseException
RtlUnwind
IsProcessorFeaturePresent
IsDebuggerPresent
SystemTimeToTzSpecificLocalTime
ExitThread
CreateThread
GetStringTypeW
DecodePointer
EncodePointer
HeapFree
HeapAlloc
GetProcessHeap
TlsAlloc
GetStartupInfoW
TlsGetValue
TlsSetValue
TlsFree
GetFileAttributesExW
GetThreadTimes
InitializeSListHead
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameW
WaitForMultipleObjectsEx
SetWaitableTimer
ResumeThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
GetCurrentThread
IsValidCodePage
GetACP
GetOEMCP
FindFirstFileExW
FlushFileBuffers
GetConsoleCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
GetTimeZoneInformation
WriteFile
CreateWaitableTimerA
user32
GetWindowTextW
MessageBoxW
FindWindowW
DefWindowProcW
LoadCursorW
RegisterClassExW
GetWindowLongW
SetWindowLongW
DestroyWindow
GetWindowRgn
CharUpperA
CharUpperW
CharPrevExA
ExitWindowsEx
PostMessageW
CharLowerW
GetWindowThreadProcessId
SetCapture
ReleaseCapture
ClientToScreen
InvalidateRect
GetDesktopWindow
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
EndDialog
OffsetRect
LoadStringA
SendMessageA
LoadIconW
SetWindowTextA
CreateWindowExW
MoveWindow
EnableWindow
wsprintfW
DrawTextA
ReleaseDC
DrawTextW
FillRect
GetClientRect
GetDC
DialogBoxParamW
LoadStringW
SetWindowPos
GetSystemMetrics
GetWindowRect
CreateDialogParamW
ShowWindow
SetWindowTextW
SendMessageW
GetDlgItem
KillTimer
SetTimer
LoadBitmapW
gdi32
GetTextExtentPointW
PtInRegion
CreateRectRgn
CreateDIBSection
CreateFontIndirectW
GetDeviceCaps
DeleteDC
BitBlt
SetTextColor
SetBkMode
CreateSolidBrush
SelectObject
CreateCompatibleDC
SetBitmapBits
CreateCompatibleBitmap
GetBitmapBits
GetObjectW
DeleteObject
advapi32
AdjustTokenPrivileges
SetFileSecurityW
LookupPrivilegeValueA
GetFileSecurityW
AllocateAndInitializeSid
FreeSid
LookupPrivilegeValueW
DuplicateTokenEx
CheckTokenMembership
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyA
RegQueryInfoKeyA
DeregisterEventSource
RegisterEventSourceA
ReportEventA
OpenProcessToken
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
SHGetFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
ShellExecuteExW
ole32
CoCreateInstance
CoCreateGuid
CoTaskMemFree
CoUninitialize
CoInitialize
oleaut32
SysAllocStringLen
SysAllocString
VariantClear
VariantCopy
SysFreeString
SysStringLen
shlwapi
StrChrW
StrRChrW
StrCmpW
PathFileExistsW
StrCatW
PathAppendW
PathIsDirectoryW
PathFileExistsA
PathRemoveFileSpecW
PathAppendA
StrCpyNW
StrCpyW
netapi32
NetApiBufferFree
NetWkstaGetInfo
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
dbghelp
MiniDumpWriteDump
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 704KB - Virtual size: 703KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ