C:\RHUB2\PCSetup\Release.V2013\PCSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9a84f8661a7d865b3ab7fcbf08ca7f10N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9a84f8661a7d865b3ab7fcbf08ca7f10N.exe
Resource
win10v2004-20240730-en
General
-
Target
9a84f8661a7d865b3ab7fcbf08ca7f10N.exe
-
Size
594KB
-
MD5
9a84f8661a7d865b3ab7fcbf08ca7f10
-
SHA1
cd619e889afebcbbd32822fd5998878c9e9022f6
-
SHA256
701cfea6f469997bf5892c8de43e53007f7cfef802d41d8db231db32d8bc5b6c
-
SHA512
b6da0a3baef1bbeef630086ddc763ae8342a3a6f73b0837e5dcb94eb8f30a678c43c9e9b694bafee96f32ab0657531545e6dedac5a48b8ae0f92b25db2ec8de3
-
SSDEEP
12288:/eJANcuoZ0/b6GGIJHmYXZAi84j55fQNVj9CUi153kTvDchrpD8:/e0WGnJf8UUVj9CUGyTvDchd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a84f8661a7d865b3ab7fcbf08ca7f10N.exe
Files
-
9a84f8661a7d865b3ab7fcbf08ca7f10N.exe.exe windows:5 windows x86 arch:x86
d91bd9cfb679d160ce4165f178029dc4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFullPathNameW
GetVolumeInformationW
LockFile
ReadFile
SetEndOfFile
UnlockFile
DuplicateHandle
GetThreadLocale
SetErrorMode
GetFileAttributesExW
GetFileSizeEx
GetTickCount
GetCommandLineW
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
CreateThread
ExitThread
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
GetFileInformationByHandle
GetFileType
PeekNamedPipe
HeapQueryInformation
FlushFileBuffers
VirtualProtect
GetStdHandle
GetStartupInfoW
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
IsValidCodePage
GetOEMCP
GetCPInfo
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetTimeZoneInformation
SetStdHandle
GetStringTypeW
LCMapStringW
WriteConsoleW
SetEnvironmentVariableA
GetCurrentDirectoryW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
CompareStringW
GlobalFlags
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FileTimeToSystemTime
MulDiv
LocalFree
GlobalUnlock
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
lstrcmpA
GlobalLock
SizeofResource
GlobalFindAtomW
GlobalAddAtomW
FindResourceW
LoadLibraryA
lstrcmpW
GlobalDeleteAtom
LockResource
LoadResource
LoadLibraryExW
FreeResource
GetSystemDirectoryW
EncodePointer
GetModuleHandleA
SetLastError
OutputDebugStringA
GetACP
lstrlenW
lstrcpyW
lstrcmpiW
FileTimeToDosDateTime
FreeLibrary
VirtualQuery
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringW
IsDebuggerPresent
WriteFile
SetFilePointer
GetFileTime
GetFileSize
FileTimeToLocalFileTime
CreateMutexW
ReleaseMutex
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GlobalFree
GlobalAlloc
CreateProcessW
GetCurrentThread
TerminateProcess
QueryPerformanceFrequency
QueryPerformanceCounter
RemoveDirectoryW
DeleteFileA
GetTempPathA
GetTempFileNameA
GetLongPathNameW
FindNextFileW
FindFirstFileW
FindClose
CreateFileW
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetThreadPriority
CreateEventW
SetEvent
CloseHandle
GetTempPathW
GetFileAttributesW
CreateDirectoryW
WideCharToMultiByte
FormatMessageW
GetVersionExW
CopyFileW
DeleteFileW
SetFileAttributesW
GetModuleHandleW
LoadLibraryW
GetSystemInfo
Sleep
WaitForSingleObject
GetCurrentProcess
OpenProcess
GetProcAddress
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
SetUnhandledExceptionFilter
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
VirtualAlloc
DecodePointer
user32
GetNextDlgGroupItem
IsRectEmpty
IntersectRect
SetRect
InvalidateRgn
CopyAcceleratorTableW
CharNextW
SetCapture
CharUpperW
KillTimer
SetTimer
DestroyMenu
LoadCursorW
GetSysColorBrush
GetSystemMetrics
RealChildWindowFromPoint
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamW
IsDialogMessageW
SetWindowTextW
IsWindowEnabled
MoveWindow
ShowWindow
ClientToScreen
EndPaint
BeginPaint
ReleaseDC
GetWindowDC
GetDC
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
MapDialogRect
SetWindowContextHelpId
SetCursor
GetCursorPos
TranslateMessage
WinHelpW
CallNextHookEx
SetWindowsHookExW
GetWindow
GetLastActivePopup
GetTopWindow
SetWindowLongW
GetWindowLongW
PtInRect
EqualRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowTextW
RemovePropW
GetPropW
SetPropW
RedrawWindow
ValidateRect
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
GetMenuItemCount
GetMenuItemID
GetSubMenu
SetMenu
GetMenu
GetKeyState
SetFocus
GetDlgCtrlID
GetDlgItem
IsWindowVisible
SetWindowPos
DestroyWindow
IsChild
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
PostThreadMessageW
RegisterClipboardFormatW
GetMessagePos
RegisterWindowMessageW
MessageBeep
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetFocus
UnhookWindowsHookEx
GetParent
SendDlgItemMessageA
wsprintfW
wvsprintfW
GetMonitorInfoW
MonitorFromWindow
FindWindowW
MessageBoxW
GetActiveWindow
GetWindowThreadProcessId
GetClassNameW
LoadIconW
LoadBitmapW
GetDesktopWindow
OffsetRect
GetWindowRect
GetClientRect
InvalidateRect
EnableWindow
ReleaseCapture
GetCapture
PostQuitMessage
SendMessageW
PeekMessageW
DispatchMessageW
GetMessageW
GetClassInfoW
UnregisterClassW
PostMessageW
GetClassLongW
gdi32
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
CreateRectRgnIndirect
ScaleWindowExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
SetViewportOrgEx
SetViewportExtEx
ExtTextOutW
TextOutW
CreateRoundRectRgn
SetMapMode
SetBkMode
SelectObject
ExtSelectClipRgn
SaveDC
RestoreDC
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetStockObject
GetClipBox
Escape
DeleteObject
DeleteDC
GetDeviceCaps
GetObjectW
SetTextColor
SetBkColor
CreateBitmap
FrameRgn
CreateSolidBrush
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
EqualSid
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegDeleteValueW
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
GetUserNameW
ImpersonateSelf
GetTokenInformation
FreeSid
AllocateAndInitializeSid
OpenThreadToken
OpenServiceW
OpenSCManagerW
ControlService
CloseServiceHandle
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteW
SHGetSpecialFolderPathW
SHGetFolderPathW
SHCreateDirectoryExW
ShellExecuteExW
comctl32
ord17
shlwapi
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
PathIsUNCW
PathStripPathW
PathStripToRootW
ole32
CoInitialize
CoCreateInstance
OleInitialize
OleUninitialize
CoUninitialize
CoCreateGuid
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
oleaut32
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysStringLen
OleCreateFontIndirect
SysAllocString
VariantChangeType
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
oledlg
OleUIBusyW
ws2_32
gethostname
WSALookupServiceEnd
WSALookupServiceNextW
WSALookupServiceBeginW
WSAAddressToStringW
gethostbyname
socket
shutdown
setsockopt
send
recv
inet_ntoa
inet_addr
htons
connect
WSAStartup
WSAGetLastError
closesocket
oleacc
CreateStdAccessibleObject
LresultFromObject
wininet
HttpSendRequestW
HttpOpenRequestW
InternetReadFile
InternetCloseHandle
InternetOpenW
HttpQueryInfoA
HttpSendRequestA
InternetOpenA
InternetErrorDlg
DetectAutoProxyUrl
InternetConnectA
InternetReadFileExA
InternetQueryOptionA
InternetSetOptionA
InternetConnectW
HttpOpenRequestA
urlmon
URLDownloadToFileA
Sections
.text Size: 377KB - Virtual size: 377KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ