C:\projects\entryprotect\package\installstub\install\Release_x86_14.2_static\build\installstub_nomanifest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8fd1476dda769e7c493df2f14f58c9a3b57443fbf97845e18b965efe11eb7bb9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8fd1476dda769e7c493df2f14f58c9a3b57443fbf97845e18b965efe11eb7bb9.exe
Resource
win10v2004-20240508-en
General
-
Target
8fd1476dda769e7c493df2f14f58c9a3b57443fbf97845e18b965efe11eb7bb9
-
Size
2.0MB
-
MD5
085a64ab7a81d83503a54b6bfbe4921e
-
SHA1
bf10c16a61d3cc62f63028cec12e18aa2b239ef8
-
SHA256
8fd1476dda769e7c493df2f14f58c9a3b57443fbf97845e18b965efe11eb7bb9
-
SHA512
bc976871c775d5547b82753a7e2ff62d0a0ab4fc916426e37eef3536d0a58eda3cfcfa6b6541f73858eccb9cf5636c56eb69f01d4b840352f6568678d596168c
-
SSDEEP
49152:7xkcsRlIlqXgNOV/8YmObnqwd+3qZu67o+JQ1ZTA:7xkVRli6gNcF1036u67oT1Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8fd1476dda769e7c493df2f14f58c9a3b57443fbf97845e18b965efe11eb7bb9
Files
-
8fd1476dda769e7c493df2f14f58c9a3b57443fbf97845e18b965efe11eb7bb9.exe windows:6 windows x86 arch:x86
b4845b838fc36488b8b95b1623cef640
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
LoadResource
LockResource
GetCurrentThreadId
FindResourceW
FormatMessageW
QueryFullProcessImageNameW
FindResourceA
MoveFileExW
CreateEventW
LocalFree
HeapSize
GetExitCodeProcess
GetCurrentProcessId
GetCurrentProcess
WaitForMultipleObjects
WaitForSingleObject
GetProcessHeap
HeapFree
HeapAlloc
SetLastError
GetLastError
CloseHandle
OutputDebugStringA
DebugBreak
GetTempPathW
WriteFile
GetTempFileNameW
SizeofResource
CreateFileW
SetStdHandle
GetCommandLineW
GetCommandLineA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
FormatMessageA
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
SetFileInformationByHandle
SetFilePointerEx
AreFileApisANSI
GetFileInformationByHandleEx
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleFileNameW
GetStdHandle
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
IsValidCodePage
WriteConsoleW
advapi32
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSecurityDescriptorSacl
RegGetValueW
GetTokenInformation
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
OpenProcessToken
shell32
SHGetFolderPathAndSubDirW
ShellExecuteExW
shlwapi
SHDeleteEmptyKeyW
user32
MessageBoxA
wsprintfA
Sections
.text Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ