D:\ReleaseJob\win\Release\stubs\x64\aijclw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4f166ed2c1658d2533efde652e3a45679c2f04325c45e832ae40a7a63b469877.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4f166ed2c1658d2533efde652e3a45679c2f04325c45e832ae40a7a63b469877.exe
Resource
win10v2004-20240419-en
General
-
Target
4f166ed2c1658d2533efde652e3a45679c2f04325c45e832ae40a7a63b469877
-
Size
1.1MB
-
MD5
106149fb42252a2e1450d4fd4bc7cf96
-
SHA1
af235e25a57fa2f22f04a4c35d2670809bac17b8
-
SHA256
4f166ed2c1658d2533efde652e3a45679c2f04325c45e832ae40a7a63b469877
-
SHA512
3cfcd3c8c67f82edcea699dae5d5e67d17b5ae0f61593a32b05d171c588871dac3b78a421c1bf8bbdb102bb9da293c7e584b28bf96411c16182268c312bc3ab6
-
SSDEEP
24576:gnjy0QxSTNFE5q5q5q5q5q5q5q5q5q5q5q5q5q5q5q5xTTTTTTTTTTTTTTT:gnj5QxSBFE5q5q5q5q5q5q5q5q5q5q5q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f166ed2c1658d2533efde652e3a45679c2f04325c45e832ae40a7a63b469877
Files
-
4f166ed2c1658d2533efde652e3a45679c2f04325c45e832ae40a7a63b469877.exe windows:6 windows x64 arch:x64
f9b3ee69ca4ae7c3b136d80b1b7b3c69
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msi
ord173
kernel32
GetFileSize
ReadFile
ExpandEnvironmentStringsW
WriteFile
GetEnvironmentVariableW
MultiByteToWideChar
WideCharToMultiByte
MulDiv
GetModuleHandleW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FlushFileBuffers
GetModuleFileNameW
lstrcmpiW
LoadLibraryExW
InitializeCriticalSectionEx
SetThreadLocale
GetSystemDefaultLCID
DecodePointer
lstrlenW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
GetExitCodeThread
CreateThread
WaitForSingleObject
OpenProcess
GetExitCodeProcess
Sleep
CreateProcessW
GetCommandLineW
AddDllDirectory
CreateEventW
SetEvent
GlobalMemoryStatus
SetEnvironmentVariableW
SetCurrentDirectoryW
GetTimeFormatW
GetDateFormatW
GetUserDefaultLangID
VerifyVersionInfoW
VerSetConditionMask
CompareStringW
LCMapStringW
FlsFree
CloseHandle
FlsGetValue
FlsAlloc
FreeEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
LoadLibraryExA
VirtualQuery
VirtualProtect
GetSystemInfo
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetConsoleOutputCP
GetConsoleMode
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
CreateDirectoryW
RemoveDirectoryW
FindNextFileW
DeleteFileW
SetLastError
GetFullPathNameW
FindFirstFileW
GetEnvironmentStringsW
FindClose
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
RaiseException
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
WriteConsoleW
FlsSetValue
user32
GetSysColor
GetFocus
SetFocus
SetCapture
GetCapture
DrawFocusRect
GetDlgCtrlID
GetCursorPos
ScreenToClient
IsWindowEnabled
FillRect
MessageBoxW
SetCursor
ReleaseCapture
TrackMouseEvent
PtInRect
SetRectEmpty
GetClassNameW
SystemParametersInfoW
GetWindowTextLengthW
GetWindowTextW
DrawTextW
OffsetRect
EnableWindow
DispatchMessageW
TranslateMessage
UpdateWindow
PeekMessageW
GetActiveWindow
GetMessageW
RegisterWindowMessageW
PostThreadMessageW
EndPaint
BeginPaint
LoadCursorW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
GetWindowLongPtrW
GetSystemMetrics
SetWindowLongPtrW
InvalidateRect
RedrawWindow
IsWindowVisible
ShowWindow
EndDialog
CreateWindowExW
IsWindow
SendMessageW
SetWindowLongW
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetParent
MapWindowPoints
SetWindowPos
SetWindowTextW
GetDlgItem
UnregisterClassW
DestroyWindow
DefWindowProcW
CharNextW
ReleaseDC
GetClientRect
GetDC
LoadStringW
DialogBoxParamW
gdi32
SetTextColor
GetStockObject
CreateFontIndirectW
GetObjectW
BitBlt
SelectObject
CreateCompatibleDC
DeleteDC
CreateCompatibleBitmap
DeleteObject
SetBkMode
advapi32
CryptAcquireContextW
RegOpenKeyExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
CryptDestroyHash
CryptHashData
CryptDestroyKey
CryptDeriveKey
CryptCreateHash
CryptReleaseContext
CryptGetHashParam
CryptDecrypt
RegCreateKeyExW
shell32
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
shlwapi
PathIsUNCW
Sections
.text Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 783KB - Virtual size: 782KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ