F:\memexec\test_loading\target\release\deps\test_loading.pdb
Static task
static1
Behavioral task
behavioral1
Sample
MSICEF6.tmp.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
MSICEF6.tmp.exe
Resource
win10v2004-20240226-en
General
-
Target
MSICEF6.tmp.exe
-
Size
472KB
-
MD5
f3092d2e603cf154a7cebde8e5f07868
-
SHA1
b164271ad70aecb4757f986e96d8a11bbc49da3e
-
SHA256
068a7dd7731272b56a03d4431b3f49ff9d4c190127aab6c127b5d246d7c68edf
-
SHA512
328944764b3d35bc3876f53626a85a85c3786541629b20a1e029f0500ea099c4c70de561119f692446f15b6946bbcf99babb1d93400de16d3a1a7aa20748644c
-
SSDEEP
6144:BveJGCndUlTIVOdtc+Hp1h/yQz+VPZspW0/9jKaSArZJsnPn:wGCndUlT4+Hp+Qz+lK1Zkv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource MSICEF6.tmp.exe
Files
-
MSICEF6.tmp.exe.exe windows:6 windows x64 arch:x64
7415399c601f1e1dc1f7804181de6c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
MessageBoxA
kernel32
GetConsoleOutputCP
HeapSize
LCMapStringW
CompareStringW
AcquireSRWLockExclusive
FlsFree
FlsSetValue
ReleaseSRWLockExclusive
GetProcessHeap
HeapFree
FlsGetValue
FlsAlloc
LoadLibraryExA
FreeLibrary
GetLastError
FormatMessageW
WaitForSingleObject
HeapAlloc
GetProcAddress
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
AddVectoredExceptionHandler
SetThreadStackGuarantee
CreateWaitableTimerExW
SetWaitableTimer
Sleep
QueryPerformanceCounter
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
LoadLibraryA
GetCPInfo
GetCommandLineW
FlushFileBuffers
SetFileInformationByHandle
SetFilePointerEx
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
CloseHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TerminateProcess
TryAcquireSRWLockExclusive
QueryPerformanceFrequency
LeaveCriticalSection
HeapReAlloc
AcquireSRWLockShared
ReleaseSRWLockShared
ReleaseMutex
GetModuleHandleA
FindNextFileW
FindClose
CreateFileW
EnterCriticalSection
EncodePointer
GetConsoleMode
GetFileType
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetModuleHandleW
GetModuleFileNameW
ExitProcess
GetFullPathNameW
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
CreateThread
GetCurrentThread
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
CreateMutexA
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
GetCurrentProcess
GetCurrentProcessId
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
oleaut32
SafeArrayAccessData
SafeArrayDestroy
VariantClear
SafeArrayUnaccessData
SafeArrayGetLBound
SafeArrayGetUBound
GetErrorInfo
SysStringLen
SysFreeString
SysAllocStringLen
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
ntdll
NtWriteFile
RtlNtStatusToDosError
Sections
.text Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ