d:\jenkins\workspace\XmpXdas\XmpXdas_AP_Gray_Pack\channel\trunk\build\setup\pdb\ProductRelease\XmpInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
71c88d287f3e572434dee8a8d487297aa7258f4c0e1a924a7d7e679461a4d8bd.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71c88d287f3e572434dee8a8d487297aa7258f4c0e1a924a7d7e679461a4d8bd.exe
Resource
win10v2004-20240802-en
General
-
Target
71c88d287f3e572434dee8a8d487297aa7258f4c0e1a924a7d7e679461a4d8bd
-
Size
10.0MB
-
MD5
0abf130ab37757b01093446e8763288a
-
SHA1
84bf465846e11038b774ceddd843b27290e10466
-
SHA256
71c88d287f3e572434dee8a8d487297aa7258f4c0e1a924a7d7e679461a4d8bd
-
SHA512
772c5365b958f6602fd4509f32fb8ea24147b37e754fce69bc46b18286995f3436741efbe2364311f2cd948a0c43f8fe36a1c54ed04e75a8a7ea25373eaf38de
-
SSDEEP
196608:Q4Ed3xlEUptohY09c+nUkWzQc4X4XL+98Qx76Zg84oyVTPLWEjTXyWdpX5lUc6:JE3xlEUptYL7+QCy98U7ageyTtjzdO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71c88d287f3e572434dee8a8d487297aa7258f4c0e1a924a7d7e679461a4d8bd
Files
-
71c88d287f3e572434dee8a8d487297aa7258f4c0e1a924a7d7e679461a4d8bd.exe windows:5 windows x86 arch:x86
28d8464addc3904b4859ab4288327261
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
iphlpapi
GetAdaptersInfo
kernel32
FreeResource
lstrcatA
GetFileAttributesA
lstrcpyA
WritePrivateProfileStringA
CreateDirectoryA
GetPrivateProfileStringA
FreeLibrary
DeviceIoControl
GetVolumeInformationA
GetVersionExA
CreateDirectoryW
CreateFileA
CopyFileW
GetFileSizeEx
VerifyVersionInfoW
VerSetConditionMask
FormatMessageW
GetOEMCP
IsValidCodePage
FindNextFileA
GetEnvironmentVariableW
GetLongPathNameW
GetDriveTypeW
MoveFileExW
Process32FirstW
DeleteFileW
GetDiskFreeSpaceExW
OutputDebugStringW
Process32NextW
CreateToolhelp32Snapshot
OpenProcess
FindClose
GetTempPathW
SetFilePointer
RemoveDirectoryW
QueryPerformanceCounter
TerminateProcess
Sleep
GetStartupInfoW
GetFileSize
ReadFile
GetTickCount
GetModuleHandleW
SetEvent
CreateEventW
InitializeCriticalSection
WaitForMultipleObjects
GetModuleFileNameW
CloseHandle
CreateFileW
WaitForSingleObject
WriteFile
LoadLibraryExW
WideCharToMultiByte
GetProcAddress
SetCurrentDirectoryW
GetCurrentDirectoryW
LoadLibraryW
GetCurrentThreadId
SetLastError
LocalFree
IsWow64Process
GetSystemTime
SystemTimeToTzSpecificLocalTime
CreateProcessW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindFirstFileExA
FindResourceW
LoadResource
FindResourceExW
RaiseException
HeapReAlloc
LockResource
GetLastError
MultiByteToWideChar
HeapSize
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
EnterCriticalSection
HeapFree
SizeofResource
SetFileAttributesW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
SetPriorityClass
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
IsDebuggerPresent
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetCurrentProcessId
MulDiv
GlobalLock
GlobalUnlock
lstrlenW
GetACP
ExitProcess
GetFileType
SetFileTime
DuplicateHandle
DosDateTimeToFileTime
SystemTimeToFileTime
GlobalAlloc
GetLocalTime
lstrcpyW
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlUnwind
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FreeEnvironmentStringsW
user32
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetClientRect
GetWindowRect
GetCursorPos
CreateCaret
GetCaretBlinkTime
SetCaretPos
ScreenToClient
MapWindowPoints
GetSysColor
IntersectRect
UnionRect
IsRectEmpty
PtInRect
GetParent
GetWindow
LoadImageW
SetCursor
InflateRect
OffsetRect
RegisterClassW
ShowWindow
EnableWindow
GetSystemMetrics
SetPropW
GetPropW
GetMonitorInfoW
SetWindowRgn
UpdateLayeredWindow
MoveWindow
GetWindowRgn
ReleaseCapture
LoadIconW
CharPrevW
DrawTextW
FillRect
SetRect
CreatePopupMenu
DestroyMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
HideCaret
ShowCaret
GetCaretPos
ClientToScreen
SystemParametersInfoW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
IsWindowEnabled
CreateAcceleratorTableW
InvalidateRgn
GetGUIThreadInfo
GetKeyboardLayout
GetKeyNameTextW
MapVirtualKeyExW
RegisterClassExW
CreateWindowExW
DestroyWindow
PostMessageW
SetCapture
GetKeyState
CallWindowProcW
DefWindowProcW
GetWindowLongW
GetFocus
SetFocus
CharNextW
IsZoomed
IsIconic
IsWindowVisible
SendMessageW
DispatchMessageW
TranslateMessage
FindWindowW
GetMessageW
MonitorFromWindow
wsprintfW
GetDesktopWindow
PostQuitMessage
GetActiveWindow
MonitorFromPoint
ReleaseDC
GetDC
IsWindow
SetTimer
LoadCursorW
SetWindowLongW
KillTimer
GetClassInfoExW
UnregisterClassW
SetForegroundWindow
SetWindowPos
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
TraceEvent
RegOpenKeyW
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
RegSetValueExW
GetTraceLoggerHandle
shell32
CommandLineToArgvW
SHGetFolderPathW
SHCreateDirectoryExW
ord165
ShellExecuteW
ShellExecuteA
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathA
Shell_NotifyIconW
DragQueryFileW
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
ReleaseStgMedium
OleDuplicateData
DoDragDrop
RegisterDragDrop
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
shlwapi
PathRemoveFileSpecW
SHGetValueW
PathIsRootW
SHSetValueW
PathAddBackslashW
PathAppendW
StrCmpIW
PathFindFileNameW
PathCombineW
PathFileExistsW
wininet
HttpOpenRequestW
InternetOpenW
HttpQueryInfoW
InternetCrackUrlW
HttpSendRequestW
InternetConnectW
InternetSetOptionW
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
ws2_32
gethostbyname
WSAStartup
gethostname
gdi32
ExtSelectClipRgn
SetBkColor
SetBkMode
GetClipBox
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SelectClipRgn
RestoreDC
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
StretchBlt
SetTextColor
GetObjectA
MoveToEx
TextOutW
GdiFlush
EnumFontFamiliesExW
GetBitmapBits
SetBitmapBits
SetStretchBltMode
RoundRect
LineTo
SaveDC
GetTextExtentPoint32W
GetDeviceCaps
comctl32
_TrackMouseEvent
ord17
InitCommonControlsEx
imm32
ImmSetCompositionWindow
ImmGetContext
ImmReleaseContext
gdiplus
GdipImageGetFrameDimensionsList
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipDrawImageRectI
GdipImageGetFrameCount
GdipImageGetFrameDimensionsCount
GdiplusStartup
GdiplusShutdown
GdipAlloc
GdipFree
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipLoadImageFromFile
GdipLoadImageFromFileICM
GdipCloneImage
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipSetImageAttributesColorMatrix
GdipSetImageAttributesColorKeys
GdipSetImageAttributesWrapMode
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipSetPixelOffsetMode
GdipSetTextRenderingHint
GdipSetInterpolationMode
GdipDrawRectangleI
GdipFillRectangleI
GdipDrawImageRectRect
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipDrawString
GdipMeasureString
GdipStringFormatGetGenericTypographic
GdipDeleteStringFormat
GdipCloneStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
Sections
.text Size: 831KB - Virtual size: 830KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64.8MB - Virtual size: 64.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ