Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
Install.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Install.exe
Resource
win11-20240802-en
General
-
Target
Install.exe
-
Size
6.7MB
-
MD5
1f5dab09f8df66fd6df158f75281c75a
-
SHA1
4cb1f5ecfd661ef6a59e3bae824d5c645c0383ce
-
SHA256
21ba019a32fb0bbdf23a489076f31f6678a797b777951b2030fd6276bbdfc32d
-
SHA512
7182270f0f7333cc7b4c5927f714dcdac6a6acc2f653b0529af493e47169ddadea5942ae4fc61efe0eacce7b0abffb0f400816753c233a8aef73a0a5182dd0d6
-
SSDEEP
196608:ztynphnABBNyTqLsfDKCw2Mq7w65b4Ry8TcYW+B7zf0Sq:zKhn6BUTqLGGH2F7wgMR5TccB7z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Install.exe
Files
-
Install.exe.exe windows:6 windows x86 arch:x86
3058b062fb2722ad1c2c68a9ff799df2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
UnregisterWait
InterlockedPushEntrySList
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapAlloc
LoadLibraryExW
ExitThread
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
RtlUnwind
RaiseException
GetCommandLineW
HeapFree
HeapReAlloc
GetStringTypeW
MultiByteToWideChar
DeleteCriticalSection
LeaveCriticalSection
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
SetStdHandle
WriteConsoleW
ReadConsoleW
CreateFileW
SwitchToThread
DeleteFileW
FileTimeToLocalFileTime
GetWindowsDirectoryW
WinExec
GetUserDefaultUILanguage
EnumResourceNamesW
IsDebuggerPresent
GetThreadPriority
QueryDosDeviceW
LockResource
GetDiskFreeSpaceW
GetThreadLocale
GetLastError
VerifyVersionInfoW
GetTempPathW
SetThreadPriority
GetExitCodeProcess
FormatMessageW
ReadProcessMemory
Sleep
LoadLibraryW
GetUserDefaultLangID
GetPrivateProfileStringW
CreateDirectoryW
SystemTimeToFileTime
LoadResource
FindResourceW
SetErrorMode
RtlCaptureContext
SetFilePointer
FindFirstFileW
EncodePointer
GetFullPathNameW
SuspendThread
DeviceIoControl
RemoveDirectoryW
GetExitCodeThread
VirtualAlloc
SetThreadLocale
GetFileAttributesW
HeapCreate
SignalObjectAndWait
GetDriveTypeW
GetFileSize
RegisterWaitForSingleObject
EnterCriticalSection
DecodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
WaitForSingleObject
DuplicateHandle
CloseHandle
WideCharToMultiByte
user32
ToAsciiEx
EndPaint
DestroyWindow
GetDlgItemInt
GetWindowRect
GetMessageW
SendDlgItemMessageA
IsIconic
SetCapture
KillTimer
IsZoomed
LoadIconA
GetMenuStringW
DrawTextExW
SetFocus
GetMenuItemInfoW
ModifyMenuW
GetDoubleClickTime
GetQueueStatus
GetWindowTextA
SetPropA
MessageBoxA
UnionRect
UnregisterClassA
GetWindowTextW
SetScrollPos
PeekMessageA
GetClassNameW
ReleaseDC
GetDlgItem
ScrollWindow
SetWindowLongW
EndDialog
SetWindowsHookExA
CheckDlgButton
EnumChildWindows
ShowWindow
SetMenu
AppendMenuA
CreateCaret
IsWindow
GetCapture
RemoveMenu
FlashWindow
GetKeyboardType
CreateWindowExW
ReleaseCapture
ScrollWindowEx
GetSystemMetrics
SetCaretPos
InsertMenuA
GetDlgItemTextW
SendMessageW
MapWindowPoints
UpdateWindow
SetWindowTextW
SetDlgItemTextA
ValidateRect
GetMonitorInfoW
GetMessageTime
RegisterClassA
GetWindow
GetMessageA
SetWindowRgn
HideCaret
CreateDialogParamA
PostQuitMessage
CharNextW
RegisterWindowMessageW
PostMessageW
GetSubMenu
MessageBeep
CharLowerBuffW
GetWindowTextLengthA
BeginPaint
GetDC
GetMenu
GetWindowPlacement
OffsetRect
InvalidateRect
GetWindowLongW
GetWindowLongA
EnableMenuItem
SetClassLongA
GetDesktopWindow
GetSysColor
CreatePopupMenu
GetSysColorBrush
IsDlgButtonChecked
CheckRadioButton
SystemParametersInfoA
SetDlgItemTextW
DialogBoxParamA
SetMenuItemInfoW
CheckMenuItem
PostMessageA
gdi32
ExtCreatePen
BitBlt
TranslateCharsetInfo
GetWindowOrgEx
MaskBlt
CreateFontIndirectW
GetDIBits
CreateHalftonePalette
SetPixel
CreateCompatibleDC
PolyPolyline
SetMapMode
CreateCompatibleBitmap
CreateBrushIndirect
SaveDC
RealizePalette
SetPaletteEntries
GetTextExtentExPointA
GetCharWidth32A
CreatePen
RectVisible
SetTextAlign
GetPixel
TextOutA
GetBitmapBits
GetTextExtentPoint32W
SetTextColor
GetCharacterPlacementW
CreateFontIndirectA
ExcludeClipRect
CreatePalette
DeleteObject
Rectangle
GetCurrentPositionEx
CreateRectRgn
Polyline
IntersectClipRect
CreateDIBitmap
GetStockObject
EndDoc
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegConnectRegistryW
StartServiceW
InitializeSecurityDescriptor
CopySid
OpenServiceW
CloseServiceHandle
RegUnLoadKeyW
ControlService
RegGetKeySecurity
EqualSid
OpenSCManagerW
shell32
CommandLineToArgvW
ShellExecuteExW
SHGetFileInfoW
oleaut32
VariantChangeType
SafeArrayCreate
VariantCopy
VariantClear
SafeArrayPtrOfIndex
SysAllocStringLen
SysFreeString
Sections
.text Size: 741KB - Virtual size: 740KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jTP Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ