C:\src\wix3\build\ship\x86\burn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eaa103a6a63dad21dc2baf4bd6b4d74fc589f4a1371c81899edce25c27f62268.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eaa103a6a63dad21dc2baf4bd6b4d74fc589f4a1371c81899edce25c27f62268.exe
Resource
win10v2004-20240419-en
General
-
Target
eaa103a6a63dad21dc2baf4bd6b4d74fc589f4a1371c81899edce25c27f62268
-
Size
841KB
-
MD5
643bca57e55ef9872a60693d9952c87b
-
SHA1
0fcd2a7adbbdd16b0703056721b5eb10b72f6e62
-
SHA256
eaa103a6a63dad21dc2baf4bd6b4d74fc589f4a1371c81899edce25c27f62268
-
SHA512
6381af45569960f4b5e6715520026706c439c6f5e0b7cf692c775dd908c3e43eb59edb2faecb150d1ad335e2089bb06f3904ba302608e067adc4085beb244ebd
-
SSDEEP
24576:rOLAE/mOQTssouFvqib2u/nYOEslT+cCiAaOdYUG:rOAQcAstFvqib2u/nYOHlycCdJq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaa103a6a63dad21dc2baf4bd6b4d74fc589f4a1371c81899edce25c27f62268
Files
-
eaa103a6a63dad21dc2baf4bd6b4d74fc589f4a1371c81899edce25c27f62268.exe windows:5 windows x86 arch:x86
c9cc000aaa99921334bb08882ec6178d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
InitiateSystemShutdownExW
GetUserNameW
RegCloseKey
RegQueryValueExW
RegDeleteValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
DecryptFileW
CreateWellKnownSid
InitializeAcl
SetEntriesInAclW
ChangeServiceConfigW
CloseServiceHandle
ControlService
OpenSCManagerW
OpenServiceW
QueryServiceStatus
QueryServiceConfigW
SetNamedSecurityInfoW
CheckTokenMembership
AllocateAndInitializeSid
SetEntriesInAclA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
GetTokenInformation
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
RegOpenKeyExW
user32
IsWindow
WaitForInputIdle
TranslateMessage
DispatchMessageW
DefWindowProcW
RegisterClassW
UnregisterClassW
MessageBoxW
GetCursorPos
GetWindowLongW
PostMessageW
LoadBitmapW
LoadCursorW
IsDialogMessageW
MonitorFromPoint
GetMonitorInfoW
PostThreadMessageW
MsgWaitForMultipleObjects
PeekMessageW
SetWindowLongW
GetMessageW
CreateWindowExW
PostQuitMessage
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
gdi32
StretchBlt
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
GetObjectW
shell32
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
ole32
CoInitializeEx
CoUninitialize
CoInitializeSecurity
CLSIDFromProgID
CoInitialize
CoTaskMemFree
CoCreateInstance
StringFromGUID2
kernel32
VerSetConditionMask
FreeLibrary
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
GetSystemTime
GetNativeSystemInfo
lstrlenW
GetModuleHandleExW
GetSystemDirectoryW
GetTempPathW
GetWindowsDirectoryW
GetSystemWow64DirectoryW
GetComputerNameW
VerifyVersionInfoW
GetVolumePathNameW
CompareStringW
GetDateFormatW
GetSystemDefaultLangID
GetUserDefaultLangID
GetStringTypeW
ExpandEnvironmentStringsW
GetFileAttributesW
ReadFile
SetFilePointerEx
CreateFileW
CreateProcessW
DuplicateHandle
InterlockedExchange
InterlockedCompareExchange
LoadLibraryW
lstrlenA
RemoveDirectoryW
CreateEventW
GetCurrentProcessId
ProcessIdToSessionId
LocalFree
OpenProcess
GetProcessId
WaitForSingleObject
WriteFile
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
CreateThread
GetExitCodeThread
FindClose
SetFileAttributesW
FindFirstFileW
FindNextFileW
SetEvent
WaitForMultipleObjects
InterlockedIncrement
InterlockedDecrement
ResetEvent
SetEndOfFile
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
CompareStringA
SetCurrentDirectoryW
GetCurrentDirectoryW
GetExitCodeProcess
SetThreadExecutionState
CopyFileExW
MapViewOfFile
UnmapViewOfFile
CreateMutexW
CreateFileMappingW
GetThreadLocale
GetVersionExW
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
VirtualFree
VirtualAlloc
MoveFileExW
CopyFileW
DeleteFileW
GetFullPathNameW
CreateDirectoryW
GetFileSizeEx
GlobalFree
GetTempFileNameW
FormatMessageW
CloseHandle
Sleep
GetLocalTime
SetFilePointer
ReleaseMutex
DeleteCriticalSection
InitializeCriticalSection
GetLastError
GetCurrentThreadId
GetCurrentProcess
HeapSetInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteConsoleW
FlushFileBuffers
GetConsoleCP
HeapReAlloc
HeapSize
GetProcessHeap
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GlobalAlloc
WaitForSingleObjectEx
OutputDebugStringW
GetFileType
GetStdHandle
WideCharToMultiByte
LCMapStringW
HeapAlloc
HeapFree
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
SystemTimeToFileTime
GetModuleHandleA
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
TerminateProcess
LoadLibraryExW
RaiseException
RtlUnwind
SetLastError
EncodePointer
DecodePointer
GetModuleFileNameW
MultiByteToWideChar
GetACP
cabinet
ord20
ord22
ord23
crypt32
CertGetCertificateContextProperty
CryptHashPublicKeyInfo
msi
ord141
ord137
ord169
ord70
ord88
ord190
ord238
ord173
ord45
ord205
ord90
ord171
ord118
ord115
ord125
ord17
ord111
ord116
ord8
rpcrt4
UuidCreate
wininet
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetSetOptionW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
InternetCrackUrlW
InternetErrorDlg
wintrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
CryptCATAdminCalcHashFromFileHandle
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
shlwapi
PathCanonicalizeW
Sections
.text Size: 291KB - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wixburn Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 419KB - Virtual size: 419KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ