X:\develop\installer\setup_1\Release\SetupProxyCommon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c51b72304d11700a3a39f6652f98fcb8a4b78cf767c9fa0dd40bf4fd2e9ef5d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c51b72304d11700a3a39f6652f98fcb8a4b78cf767c9fa0dd40bf4fd2e9ef5d.exe
Resource
win10v2004-20240412-en
General
-
Target
3c51b72304d11700a3a39f6652f98fcb8a4b78cf767c9fa0dd40bf4fd2e9ef5d
-
Size
4.8MB
-
MD5
3677a78fb190c093ff224b4790a239b1
-
SHA1
5d030bdd9c03a3cd0d74a7e448466c9daa645794
-
SHA256
3c51b72304d11700a3a39f6652f98fcb8a4b78cf767c9fa0dd40bf4fd2e9ef5d
-
SHA512
02a4a2314f39fab2d084f3da7c1b365300a9b3793b897c284f68223cc9e5c716414a794ef3150a838ddd20cc29a43e8585155f0e0b36baed33bfc6442f4973b0
-
SSDEEP
98304:R2hRk6tPeRF6tPeRRENnCC7kjWxxckUHlTi5wSWUX2mh1SR3/j:R2hJJDJgEtkj6ikUHl0WUm41SR3L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c51b72304d11700a3a39f6652f98fcb8a4b78cf767c9fa0dd40bf4fd2e9ef5d
Files
-
3c51b72304d11700a3a39f6652f98fcb8a4b78cf767c9fa0dd40bf4fd2e9ef5d.exe windows:5 windows x86 arch:x86
3dde57d594cca5cfd9ac2475245abc10
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
LoadLibraryW
GetModuleHandleW
FindResourceW
GetDiskFreeSpaceExA
RemoveDirectoryW
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
lstrcmpiW
OutputDebugStringA
GetModuleFileNameA
GetTempPathA
CreateDirectoryA
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
DeleteFileA
FindFirstFileA
FindNextFileA
GetTickCount
GetSystemInfo
CloseHandle
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
OutputDebugStringW
GetOEMCP
FindClose
SizeofResource
LoadResource
Sleep
GetLastError
GetCurrentThreadId
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
OpenProcess
GetProcAddress
FreeLibrary
LockResource
WaitForSingleObject
CreateDirectoryW
GetTempPathW
GetACP
IsValidCodePage
SetFilePointerEx
ReadConsoleW
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetFileType
HeapSize
GetModuleHandleExW
ExitProcess
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
GetModuleFileNameW
GetCommandLineW
TlsGetValue
TlsAlloc
GetVersionExA
LocalFree
FormatMessageA
FormatMessageW
SetConsoleCtrlHandler
GetProcessTimes
GetStdHandle
SetFileApisToOEM
GetConsoleScreenBufferInfo
AreFileApisANSI
SetProcessAffinityMask
MapViewOfFile
UnmapViewOfFile
OpenEventA
OpenFileMappingA
VirtualAlloc
VirtualFree
GetModuleHandleA
GetSystemTimeAsFileTime
FileTimeToDosDateTime
CompareFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FileTimeToLocalFileTime
SetLastError
SetFileTime
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
SetFileAttributesW
MoveFileA
MoveFileW
InitializeCriticalSection
SetEvent
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetFileAttributesW
GetFileSize
WriteFile
ReadFile
DeviceIoControl
SetEndOfFile
SetFilePointer
CreateFileA
GetFileInformationByHandle
LoadLibraryExW
GetConsoleMode
SetConsoleMode
FileTimeToSystemTime
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GlobalMemoryStatus
EncodePointer
DecodePointer
GetStringTypeW
HeapFree
HeapAlloc
GetCommandLineA
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
CreateThread
ExitThread
HeapReAlloc
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
user32
FindWindowW
GetWindowThreadProcessId
CharLowerW
PostMessageW
CharUpperA
CharUpperW
ExitWindowsEx
wsprintfW
LoadStringA
MessageBoxW
advapi32
GetFileSecurityW
SetFileSecurityW
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
CheckTokenMembership
DuplicateTokenEx
LookupPrivilegeValueW
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
shell32
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoCreateGuid
CoTaskMemFree
shlwapi
PathAppendA
StrCpyW
PathRemoveFileSpecW
PathAppendW
StrChrW
StrCpyNW
PathFileExistsA
PathFileExistsW
StrRChrW
StrCatW
StrCmpW
netapi32
NetApiBufferFree
NetWkstaGetInfo
iphlpapi
GetAdaptersInfo
dbghelp
MiniDumpWriteDump
oleaut32
VariantCopy
VariantClear
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
Sections
.text Size: 435KB - Virtual size: 435KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 800KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ