D:\projects\standalone_distrib\testing\windows-setup\starter\starter\Release\setup-starter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
70cc19636fae4fe0b267dabf188e0def02278d4da3208886c39208fc6d78a84c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
70cc19636fae4fe0b267dabf188e0def02278d4da3208886c39208fc6d78a84c.exe
Resource
win10v2004-20240226-en
General
-
Target
70cc19636fae4fe0b267dabf188e0def02278d4da3208886c39208fc6d78a84c
-
Size
6.0MB
-
MD5
13e4070bf86295c6c1400dd76c028a57
-
SHA1
0483a5b3215bea8f3335b1fb98bc335204ed5bcf
-
SHA256
70cc19636fae4fe0b267dabf188e0def02278d4da3208886c39208fc6d78a84c
-
SHA512
3fa36f7e4d0e4c60c3afe3affa4f80f2a242ee14dbb2ac6e5f64ea62e27995bc94cc61f9b0381aea38552c96a2c6dac40c51369f5fc7e37f323d8d77380b2bf7
-
SSDEEP
98304:rfIKy6ALS8GzJkFHy706iFIhcbxyT5XdJOyj2+q9/V9ql:iLS8OJi6iFIWGJO9+q9Kl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70cc19636fae4fe0b267dabf188e0def02278d4da3208886c39208fc6d78a84c
Files
-
70cc19636fae4fe0b267dabf188e0def02278d4da3208886c39208fc6d78a84c.exe windows:5 windows x86 arch:x86
5809f802dfd23203b66c8434806363c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtect
GetProcAddress
GetModuleHandleW
VirtualQuery
GetVersionExW
SetLastError
GetHandleInformation
RemoveDirectoryW
GetUserDefaultLangID
WaitForMultipleObjects
WaitForSingleObject
CreateFileW
CreateEventW
GetLastError
SetEvent
CloseHandle
CreateProcessW
GetTickCount
GetExitCodeProcess
DeviceIoControl
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
RaiseException
ResetEvent
DecodePointer
DeleteCriticalSection
FindResourceExW
LoadResource
CreateDirectoryW
ReadFile
SizeofResource
FindFirstFileW
HeapFree
VirtualFree
FindNextFileW
GetCurrentProcess
WriteFile
ExpandEnvironmentStringsW
GetShortPathNameW
VirtualAlloc
TerminateProcess
GetModuleFileNameW
SetEndOfFile
GetTempPathW
FindClose
GetFileAttributesW
GetSystemDirectoryW
UnmapViewOfFile
FreeResource
SetFileAttributesW
MultiByteToWideChar
LockResource
DeleteFileW
FindResourceW
HeapAlloc
GetWindowsDirectoryW
SetFilePointerEx
MoveFileExW
GetFileSize
GetProcessHeap
WideCharToMultiByte
GetFileType
CreateFileMappingW
MapViewOfFile
FlushFileBuffers
Sleep
SetFilePointer
MapViewOfFileEx
FlushViewOfFile
GetCurrentProcessId
LocalAlloc
LocalFree
LoadLibraryW
FreeLibrary
FormatMessageW
lstrlenW
LocalSize
GetSystemInfo
LoadLibraryExW
HeapReAlloc
HeapSize
GetCurrentThread
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
FindFirstFileExW
GetFileAttributesExW
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThreadId
GetExitCodeThread
EncodePointer
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RestoreLastError
OutputDebugStringW
FormatMessageA
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
ExitThread
GetModuleHandleExW
GetStdHandle
ExitProcess
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
LoadLibraryExA
CreateFileMappingA
MoveFileW
Sections
.text Size: 668KB - Virtual size: 668KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ