o:\src\python-3-trunk\lib\distutils\command\wininst-9.0-amd64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3800822963d633d0b049e6a85b7dd9765203ea114b509f2f01707cffe9c307bf.exe
Resource
win7-20240704-en
General
-
Target
3800822963d633d0b049e6a85b7dd9765203ea114b509f2f01707cffe9c307bf
-
Size
1.3MB
-
MD5
9efd8913130282f6aee4aa8264fe65ec
-
SHA1
081647fe9279f650002e17026cbd988aca1b3c9c
-
SHA256
3800822963d633d0b049e6a85b7dd9765203ea114b509f2f01707cffe9c307bf
-
SHA512
84d8ebf2dce1ab13ca04d3a68aaf78db666624b969223994945a60d17730b063d9f10dbea6fd0a4bf13f0062dbbc742f11b652bb758480d9cef36e89037d3125
-
SSDEEP
12288:6vWxHwOJ6z4Tfx9QfW+lCFcD1goThydrWUeB+QChZsrwbebPeVmfCUqVfZbdbHF:6vyHwOhTJ9ZUOoTqy8QCYrLLeYKUML
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3800822963d633d0b049e6a85b7dd9765203ea114b509f2f01707cffe9c307bf
Files
-
3800822963d633d0b049e6a85b7dd9765203ea114b509f2f01707cffe9c307bf.exe windows:5 windows x64 arch:x64
14cf8f87d7eefee36338756e049a016b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
kernel32
FreeLibrary
SetStdHandle
GetStdHandle
LocalFree
FormatMessageA
GetTempFileNameA
GetTempPathA
GetModuleHandleA
GetVersionExA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetModuleFileNameA
RemoveDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetModuleFileNameW
SetEndOfFile
CompareStringA
GetFileSize
GetLocaleInfoW
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
GetConsoleMode
SetFilePointer
ReadFile
DeleteFileA
LoadLibraryA
GetProcAddress
MultiByteToWideChar
lstrlenA
CompareStringW
UnmapViewOfFile
CreateFileA
GetLastError
DosDateTimeToFileTime
SetFileTime
CloseHandle
CreateFileMappingA
MapViewOfFile
GetFileAttributesA
CreateDirectoryA
SetLastError
GetConsoleCP
SetHandleCount
FatalAppExitA
DeleteCriticalSection
GetProcessHeap
RtlUnwindEx
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
EnterCriticalSection
LeaveCriticalSection
GetDateFormatA
GetTimeFormatA
HeapReAlloc
GetModuleHandleW
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WideCharToMultiByte
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
TlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetCurrentThreadId
FlsAlloc
HeapSetInformation
HeapCreate
HeapDestroy
WriteFile
SetEnvironmentVariableA
SetEnvironmentVariableW
user32
wsprintfA
GetFocus
ShowWindow
SetCursor
GetDlgItem
SendDlgItemMessageA
GetParent
PostMessageA
GetWindowRect
MoveWindow
LoadCursorA
RegisterClassA
CreateWindowExA
MessageBoxA
UpdateWindow
DefWindowProcA
BeginPaint
GetSystemMetrics
EndPaint
TranslateMessage
DispatchMessageA
PeekMessageA
GetDC
ReleaseDC
SendMessageA
SetDlgItemTextA
gdi32
CreateFontA
SelectObject
SetBkMode
TextOutA
SetTextColor
DeleteObject
CreateDIBitmap
CreateSolidBrush
advapi32
RegDeleteKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE