H:\DTLInstallBuilder\bin\DTLUnInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0a84c73dde646463f229070ccd389dfce4131a8a652f24d2ed8a507656387533.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0a84c73dde646463f229070ccd389dfce4131a8a652f24d2ed8a507656387533.exe
Resource
win10v2004-20240508-en
General
-
Target
0a84c73dde646463f229070ccd389dfce4131a8a652f24d2ed8a507656387533
-
Size
713KB
-
MD5
de0dece041d284fef9c2ec92251111cd
-
SHA1
6e39fef0ea38b9534a57e4902a08493f14c38cfd
-
SHA256
0a84c73dde646463f229070ccd389dfce4131a8a652f24d2ed8a507656387533
-
SHA512
baf583256f29bce78cf9117e2f99e49f2243600c8d3614b5b771813c795bad2b9740df7c3b69a01879a11b77176ee6e00d2b8a3d46ba1f2b6aa22dca3384d2d4
-
SSDEEP
12288:xWof/Z7oCCnZ77oLuaYM+PoyObK6OsfRgL7/slspf2Xnz2:x9ECCnyLYM+fS5uLk2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a84c73dde646463f229070ccd389dfce4131a8a652f24d2ed8a507656387533
Files
-
0a84c73dde646463f229070ccd389dfce4131a8a652f24d2ed8a507656387533.exe windows:5 windows x86 arch:x86
c651c0ef4330d46aded540d8f00bf586
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetCurrentDirectoryW
GetFileAttributesW
RemoveDirectoryW
MoveFileExW
SetEnvironmentVariableW
VirtualProtect
GetVersionExW
GetCommandLineW
FindResourceExW
MulDiv
GetProfileIntA
GlobalAlloc
GlobalLock
LeaveCriticalSection
RaiseException
EnterCriticalSection
GetCurrentThreadId
CreateProcessW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
lstrlenW
CreateDirectoryW
CopyFileW
FlushInstructionCache
SetEndOfFile
SetEnvironmentVariableA
GetFileAttributesExW
WriteConsoleW
SetStdHandle
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetTimeZoneInformation
CreatePipe
FlushFileBuffers
GetStringTypeW
GetConsoleCP
ReadConsoleW
GetConsoleMode
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStdHandle
CreateProcessA
DuplicateHandle
GetTempPathA
GetSystemTimeAsFileTime
ReadFile
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
IsDebuggerPresent
AreFileApisANSI
GetModuleHandleExW
ExitThread
CreateThread
LoadLibraryExA
GetModuleFileNameA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetFileAttributesW
FreeResource
FindResourceW
lstrcmpW
LoadResource
LockResource
SizeofResource
lstrcmpA
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
ExpandEnvironmentStringsW
FindNextFileW
GetFullPathNameW
FindFirstFileW
FindClose
SetEvent
CreateEventW
GetCurrentDirectoryW
GetWindowsDirectoryW
VerifyVersionInfoW
GetModuleFileNameW
VerSetConditionMask
QueryDosDeviceW
GetLogicalDriveStringsW
lstrcmpiW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
WideCharToMultiByte
FormatMessageA
WaitForSingleObject
GetExitCodeProcess
OpenProcess
CloseHandle
FreeLibrary
SetLastError
TerminateProcess
LocalFree
GetCurrentProcess
DeleteFileW
GetTempFileNameW
WriteFile
GetModuleHandleW
GetProcAddress
CreateFileW
Sleep
GetTickCount
GetLastError
CreateMutexW
SetFilePointerEx
user32
MessageBoxW
OpenClipboard
EmptyClipboard
CloseClipboard
LoadStringW
ExitWindowsEx
PeekMessageW
DispatchMessageW
TranslateMessage
PostMessageW
GetWindowThreadProcessId
CreateDialogParamW
EnumWindows
SwitchToThisWindow
SendMessageW
PtInRect
GetSysColor
GetSystemMetrics
GetDoubleClickTime
GetDesktopWindow
GetDC
ReleaseDC
IsIconic
GetParent
GetWindowLongW
SetWindowLongW
DefWindowProcW
GetCursorPos
ScreenToClient
GetKeyState
GetDlgItem
GetFocus
IntersectRect
GetWindowRect
InflateRect
MapWindowPoints
InvalidateRect
ShowScrollBar
EnableScrollBar
SetScrollRange
SetScrollPos
UpdateWindow
CreateCaret
ShowCaret
HideCaret
SetCaretPos
SetTimer
KillTimer
ScrollWindowEx
UnregisterClassW
FindWindowW
GetMessageW
SetCursor
ClientToScreen
LoadCursorW
DestroyCursor
OffsetRect
GetCaretPos
ShowWindow
RegisterClassW
GetClassInfoW
CharNextW
DestroyWindow
SetCapture
ReleaseCapture
PostQuitMessage
IsDialogMessageW
UpdateLayeredWindow
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetClientRect
SetWindowTextW
SetWindowPos
LoadImageW
gdi32
ExtSelectClipRgn
CreateRectRgn
BitBlt
CreateCompatibleDC
DeleteDC
GetTextMetricsW
DPtoLP
GdiSetBatchLimit
GetDeviceCaps
GetObjectW
GetStockObject
CreateDIBSection
DeleteObject
SelectObject
CreateFontIndirectW
advapi32
IsValidSid
RegQueryInfoKeyW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetNamedSecurityInfoW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
AddAce
InitializeAcl
GetLengthSid
LookupAccountNameW
CopySid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
QueryServiceStatusEx
EnumDependentServicesW
ControlService
StartServiceW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
shell32
ord165
CommandLineToArgvW
SHGetSpecialFolderPathW
ShellExecuteExW
SHFileOperationW
DragQueryFileW
SHChangeNotify
ShellExecuteW
ole32
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CreateStreamOnHGlobal
RegisterDragDrop
RevokeDragDrop
CoCreateInstance
PropVariantClear
ReleaseStgMedium
OleGetClipboard
OleUninitialize
OleInitialize
CoUninitialize
oleaut32
VariantClear
VariantInit
SysAllocStringLen
VarUI4FromStr
SysFreeString
VarBstrCmp
SysAllocString
shlwapi
PathQuoteSpacesW
StrToIntExW
PathRemoveFileSpecW
PathIsDirectoryW
PathFindFileNameW
PathFileExistsW
PathCombineW
PathAppendW
PathAddBackslashW
SHStrDupW
PathUnquoteSpacesW
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipAlloc
GdipFree
GdiplusShutdown
GdiplusStartup
GdipDeleteGraphics
GdipCreateFromHDC
GdipFillRectangleI
GdipReleaseDC
GdipGetDC
GdipGetClipBoundsI
GdipGetImageHeight
GdipSetInterpolationMode
GdipGetInterpolationMode
GdipLoadImageFromStream
GdipDisposeImage
GdipCloneImage
GdipResetClip
GdipSetClipRect
GdipDeleteFont
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFont
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipDrawImagePointRectI
GdipDrawString
GdipSetTextRenderingHint
GdipGetTextRenderingHint
GdipGetImageWidth
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDrawImageRectRect
psapi
GetProcessImageFileNameW
urlmon
URLDownloadToFileW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
Sections
.text Size: 414KB - Virtual size: 413KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ