D:\Jenkins\.jenkins\workspace\bluewhale_install_uninst\install_uninstall_code\Release\Install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
26a40782040216e2fc0333e5f287e2f50d3611b0962153fd0a6740c2521d4756.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
26a40782040216e2fc0333e5f287e2f50d3611b0962153fd0a6740c2521d4756.exe
Resource
win10v2004-20240508-en
General
-
Target
26a40782040216e2fc0333e5f287e2f50d3611b0962153fd0a6740c2521d4756
-
Size
14.9MB
-
MD5
76b2fc40769689455303764527e69aa8
-
SHA1
688e05dc834fa66dba8ba7d7e19ad52e0eb2d1a2
-
SHA256
26a40782040216e2fc0333e5f287e2f50d3611b0962153fd0a6740c2521d4756
-
SHA512
742c3991198693c8b596f42926fd582091ae2a5ca3dc43c08fd9bd2ff73d7b639db4e5e4e75ff427b536d4797ec11dfecf875e47f9f53843b083457b48f0f316
-
SSDEEP
393216:wgKtWvY83DTZhifTO69l42BO/jJrSF9WjfA:wCZt69W2A/gzWTA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 26a40782040216e2fc0333e5f287e2f50d3611b0962153fd0a6740c2521d4756
Files
-
26a40782040216e2fc0333e5f287e2f50d3611b0962153fd0a6740c2521d4756.exe windows:5 windows x86 arch:x86
810dfcd65148adc06e6307d9eb465992
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
ExitThread
lstrcmpiW
LoadLibraryExW
GetCommandLineW
WritePrivateProfileStringW
SetEvent
CreateEventW
GetDriveTypeW
GetEnvironmentVariableW
RtlCaptureStackBackTrace
GetFileInformationByHandle
CompareFileTime
FindCloseChangeNotification
FindFirstChangeNotificationW
SearchPathW
CreateDirectoryW
GetCurrentDirectoryW
SetFileTime
GetTempFileNameW
lstrlenA
FormatMessageW
LocalAlloc
GetSystemInfo
ResetEvent
GetFileSizeEx
OutputDebugStringW
CreateThread
RaiseException
DecodePointer
LoadLibraryA
lstrcpynW
GetLocalTime
Sleep
DeleteCriticalSection
LocalFree
LoadLibraryW
GetCurrentProcess
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
GetVersionExW
GetModuleHandleW
GetTickCount
GetProcAddress
CreateFileW
ReadFile
GetFileSize
UnlockFile
LockFile
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetModuleFileNameW
CreateMutexW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetEndOfFile
WriteConsoleW
SetFilePointerEx
ReadConsoleW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
SetConsoleCtrlHandler
GetConsoleMode
GetConsoleCP
GetCurrentProcessId
WriteFile
OpenProcess
GetLongPathNameW
MoveFileExW
MoveFileW
FindNextFileW
FindFirstFileW
DeleteFileW
GetFileAttributesW
GetCurrentThreadId
GetFullPathNameW
RemoveDirectoryW
GetWindowsDirectoryW
GetTempPathW
FindResourceExW
FindResourceW
WaitForSingleObject
lstrlenW
FindClose
SizeofResource
LoadResource
SetLastError
GetLastError
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LockResource
DeleteFileA
CreateFileA
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetStringTypeW
GetFileType
GetACP
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
ResumeThread
RtlUnwind
OutputDebugStringA
CopyFileW
QueryDosDeviceW
GetLogicalDriveStringsW
GetExitCodeProcess
WaitForMultipleObjectsEx
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
SetProcessAffinityMask
VirtualProtect
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
GetTempFileNameA
GetTempPathA
CloseHandle
CreateTimerQueue
lstrcmpiA
lstrcmpA
DeviceIoControl
GetSystemWindowsDirectoryW
FreeResource
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TryEnterCriticalSection
SetFileAttributesW
InitializeCriticalSectionAndSpinCount
QueryPerformanceFrequency
QueryPerformanceCounter
TerminateProcess
GetNativeSystemInfo
GetExitCodeThread
GetCurrentThread
SwitchToThread
WaitForSingleObjectEx
DuplicateHandle
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
GetShortPathNameW
GetPrivateProfileStringW
OpenEventW
InterlockedCompareExchange
InterlockedExchange
GetDiskFreeSpaceExW
WaitForMultipleObjects
SetFilePointer
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GetFileAttributesExW
GetSystemDirectoryW
user32
BeginPaint
ReleaseDC
GetDC
DrawTextW
ReleaseCapture
CallWindowProcW
SetCapture
GetAsyncKeyState
GetFocus
GetDlgItem
SetWindowPos
UpdateLayeredWindow
ShowWindow
InvalidateRect
DestroyWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
SendMessageW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
GetClientRect
GetWindowRect
ScreenToClient
FillRect
GetWindowLongW
DefWindowProcW
UnregisterClassW
LoadStringW
GetShellWindow
GetWindowThreadProcessId
FindWindowExW
PostMessageW
KillTimer
SetTimer
EndPaint
SetWindowLongW
IsDialogMessageW
GetActiveWindow
EndDialog
DialogBoxParamW
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
CopyRect
MapWindowPoints
RedrawWindow
SetForegroundWindow
GetSystemMetrics
EnableWindow
SetFocus
IsIconic
IsWindowVisible
MoveWindow
wsprintfW
SendMessageTimeoutW
FindWindowW
UnionRect
OffsetRect
EqualRect
PtInRect
SetCursor
DrawFocusRect
UnregisterClassA
PostQuitMessage
CharNextW
BringWindowToTop
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
LoadCursorW
GetParent
gdi32
CreateCompatibleDC
CreateRectRgnIndirect
DeleteDC
DeleteObject
GetStockObject
RestoreDC
BitBlt
SelectClipRgn
SelectObject
SetBkMode
SetTextColor
CreateDIBSection
GetObjectW
SetViewportOrgEx
EnumFontFamiliesW
RectVisible
SaveDC
OffsetViewportOrgEx
CreateFontW
CreateCompatibleBitmap
advapi32
RegQueryValueExA
RegEnumKeyExA
GetTokenInformation
CryptContextAddRef
CryptDecrypt
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegCloseKey
DuplicateTokenEx
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
GetTrusteeNameW
BuildExplicitAccessWithNameW
GetExplicitEntriesFromAclW
LookupAccountNameW
LookupAccountSidW
DeleteAce
RegOpenKeyExA
EqualSid
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
SetNamedSecurityInfoW
CreateWellKnownSid
GetUserNameW
SetEntriesInAclW
GetNamedSecurityInfoW
shell32
CommandLineToArgvW
SHGetPathFromIDListW
SHGetFolderPathW
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteExW
SHChangeNotify
SHCreateDirectoryExW
ShellExecuteW
ord165
SHBrowseForFolderW
ole32
CoCreateGuid
CoTaskMemFree
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
OleRun
CoInitialize
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
oleaut32
VarBstrCmp
VariantClear
SysFreeString
SysAllocString
SysStringByteLen
VarUI4FromStr
SysStringLen
VariantInit
VariantChangeType
GetErrorInfo
SetErrorInfo
CreateErrorInfo
SysAllocStringByteLen
VariantCopy
shlwapi
PathFindFileNameA
PathRenameExtensionA
PathAppendW
PathCombineW
PathFileExistsW
PathFindExtensionW
StrCmpNIW
StrTrimA
StrStrIA
PathFindFileNameW
StrCmpIW
StrToIntExW
SHGetValueW
PathRemoveFileSpecW
StrStrIW
PathIsRelativeW
PathIsRootW
SHSetValueA
wnsprintfW
PathIsDirectoryW
SHSetValueW
StrToInt64ExW
wvnsprintfW
SHGetValueA
PathIsPrefixW
AssocQueryStringW
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdipDeleteGraphics
GdipSetSmoothingMode
GdipFillPath
GdipCreateLineBrushI
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFile
GdipCreateBitmapFromStream
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteBrush
GdipCloneImage
GdipSetStringFormatTrimming
GdipCloneBrush
GdipAddPathArcI
GdipClosePathFigure
GdipDeletePath
GdipCreatePath
GdipFree
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipGetImageWidth
GdipGetImageHeight
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipSetImageAttributesColorMatrix
GdipSetTextRenderingHint
GdipDrawRectangleI
GdipFillRectangleI
GdipDrawImagePointRectI
GdipDrawImageRectRect
GdipDrawImageRectRectI
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipDrawString
GdipMeasureString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
psapi
GetProcessImageFileNameW
EnumProcesses
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
wininet
InternetGetConnectedState
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
winhttp
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpSetOption
WinHttpSetCredentials
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryDataAvailable
setupapi
SetupIterateCabinetW
Exports
Exports
BasicEntry
InstallEntryW
Start
_BasicEntryEx@12
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 254KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ