Behavioral task
behavioral1
Sample
bsod.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Ninite Python Python x64 3 Installer.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
bsod.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
bsod.pyc
Resource
win11-20240802-en
General
-
Target
bsod.zip
-
Size
7.9MB
-
MD5
f1f02a1d1ca0b3bad4ad2ca8be3f2a63
-
SHA1
39a717b718ff78733a4dcb69270c14d16282114e
-
SHA256
e100000a3f6b6bcfaed48625833fec51d5082d524b7791d440bc0adec4048c1b
-
SHA512
6438cb38e53c960c6d81880d352e267f70229637711051b2c33c67b7ee660145c3f8b7fe64171b8170e2e95de12a4119bf9ebc88381a2e2f81faf02a09d964c0
-
SSDEEP
196608:pWggi7OPiPsa1K5VZ5SAfS1yLL4A/cAVYqET+9KME3eDoFBL36:Qgr7O6kD5/5SXmEAlpT9xOSQK
Malware Config
Signatures
-
Detects Pyinstaller 1 IoCs
resource yara_rule static1/unpack001/bsod.exe pyinstaller -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bsod.exe
Files
-
bsod.zip.zip
-
Ninite Python Python x64 3 Installer.exe.exe windows:5 windows x86 arch:x86
0ba45f8e3256fff048470d02ee09aabb
Code Sign
01Certificate
IssuerCN=Ninite PayloadNot Before17/07/2014, 17:44Not After18/07/2014, 17:44SubjectCN=Ninite Payload7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21/12/2012, 00:00Not After30/12/2020, 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
47:c3:0f:fe:fc:22:bb:28:0f:96:fe:a7:52:51Certificate
IssuerCN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BENot Before16/03/2016, 00:00Not After16/03/2024, 00:00SubjectCN=GlobalSign CodeSigning CA - G3,O=GlobalSign nv-sa,C=BEExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18/10/2012, 00:00Not After29/12/2020, 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
21:dc:b4:05:b2:1d:03:a3:26:5a:94:a3Certificate
IssuerCN=GlobalSign CodeSigning CA - G3,O=GlobalSign nv-sa,C=BENot Before13/10/2016, 17:09Not After30/11/2019, 20:25SubjectCN=Secure By Design Inc.,O=Secure By Design Inc.,L=San Francisco,ST=CA,C=US,1.2.840.113549.1.9.1=#0c12636f6e74616374406e696e6974652e636f6dExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
61:0b:7f:6b:00:00:00:00:00:19Certificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before23/05/2006, 17:00Not After23/05/2016, 17:10SubjectCN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BEKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
48:1b:6a:07:26:d2:e8:3f:26:02:d4:82:5a:cdCertificate
IssuerCN=GlobalSign,OU=GlobalSign Root CA - R3,O=GlobalSignNot Before15/06/2016, 00:00Not After15/06/2024, 00:00SubjectCN=GlobalSign CodeSigning CA - SHA256 - G3,O=GlobalSign nv-sa,C=BEExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
42:a2:7c:81:93:9a:f4:4e:4b:b0:c2:48Certificate
IssuerCN=GlobalSign CodeSigning CA - SHA256 - G3,O=GlobalSign nv-sa,C=BENot Before13/10/2016, 20:16Not After30/11/2019, 20:25SubjectCN=Secure By Design Inc.,O=Secure By Design Inc.,L=San Francisco,ST=CA,C=US,1.2.840.113549.1.9.1=#0c12636f6e74616374406e696e6974652e636f6dExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
4e:b0:87:8f:cc:24:35:36:b2:d8:c9:f7:bf:39:55:77Certificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before31/12/2015, 00:00Not After09/07/2019, 18:40SubjectCN=COMODO SHA-256 Time Stamping Signer,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
42:98:f9:74:63:76:61:16:e3:5d:61:52:20:59:35:df:92:4e:46:27:b4:bd:67:54:22:0f:e6:af:b7:88:2d:3fSigner
Actual PE Digest42:98:f9:74:63:76:61:16:e3:5d:61:52:20:59:35:df:92:4e:46:27:b4:bd:67:54:22:0f:e6:af:b7:88:2d:3fDigest Algorithmsha256PE Digest Matchestrue1a:63:0d:ee:af:52:03:eb:0c:09:36:f0:61:6b:b5:18:ac:8d:ca:4fSigner
Actual PE Digest1a:63:0d:ee:af:52:03:eb:0c:09:36:f0:61:6b:b5:18:ac:8d:ca:4fDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\ninite\Output\pdbs\Release\FetchApps.pdb
Imports
kernel32
ReadFile
CreateFileW
GetFileSizeEx
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
GetProcAddress
GetModuleHandleW
SetFileTime
GetStdHandle
Sleep
LoadLibraryW
LocalFree
FormatMessageW
VirtualQuery
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetComputerNameW
GetLocalTime
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
GetPrivateProfileStringW
SetEvent
CreateEventW
TerminateProcess
CreateThread
SetFilePointerEx
RaiseException
GetCommandLineW
GetCurrentThreadId
SetLastError
FreeLibrary
DecodePointer
FlushFileBuffers
WriteFile
GetConsoleCP
SetStdHandle
CreateDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
TlsFree
WideCharToMultiByte
GetConsoleMode
MultiByteToWideChar
GetLastError
MoveFileExW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentProcess
RemoveDirectoryW
DeleteFileW
SetFileAttributesW
GetFileAttributesW
GetModuleFileNameW
ExpandEnvironmentStringsW
GetShortPathNameW
GetTempPathW
CloseHandle
LocalAlloc
GetProcessHeap
TlsSetValue
TlsGetValue
TlsAlloc
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
WriteConsoleW
user32
GetParent
GetClientRect
GetWindowRect
MapWindowPoints
MonitorFromWindow
GetWindowLongW
GetWindow
LoadImageW
GetSystemMetrics
SendMessageW
SetWindowLongW
ShowWindow
SetWindowPos
GetWindowTextLengthW
GetWindowTextW
GetDlgItem
PostMessageW
GetMonitorInfoW
DestroyMenu
CallWindowProcW
LoadMenuW
GetSubMenu
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
LoadStringW
DialogBoxParamW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
TrackPopupMenu
GetCursorPos
SetForegroundWindow
PostQuitMessage
RegisterWindowMessageW
EndDialog
MessageBoxW
WaitForInputIdle
gdi32
GetStockObject
advapi32
CheckTokenMembership
GetLengthSid
IsValidSid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
DeregisterEventSource
RegisterEventSourceW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
ReportEventW
CopySid
shell32
ShellExecuteW
Shell_NotifyIconW
CommandLineToArgvW
wintrust
WinVerifyTrust
crypt32
CryptMsgGetParam
CertFindCertificateInStore
CertGetNameStringW
CertGetCertificateContextProperty
CryptUnprotectData
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertFreeCertificateChain
CryptQueryObject
wininet
InternetConnectW
HttpSendRequestW
InternetOpenW
InternetOpenUrlW
InternetCloseHandle
InternetCrackUrlW
InternetQueryOptionW
InternetSetOptionW
HttpOpenRequestW
InternetWriteFile
InternetReadFile
HttpQueryInfoW
HttpEndRequestW
HttpSendRequestExW
rpcrt4
UuidCreateSequential
RpcStringFreeW
UuidToStringW
urlmon
ObtainUserAgentString
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
bsod.exe.exe windows:6 windows x64 arch:x64
72c4e339b7af8ab1ed2eb3821c98713a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
CreateWindowExW
ShutdownBlockReasonCreate
MsgWaitForMultipleObjects
ShowWindow
DestroyWindow
RegisterClassW
DefWindowProcW
PeekMessageW
DispatchMessageW
TranslateMessage
PostMessageW
GetMessageW
MessageBoxW
MessageBoxA
SystemParametersInfoW
DestroyIcon
SetWindowLongPtrW
GetWindowLongPtrW
GetClientRect
InvalidateRect
ReleaseDC
GetDC
DrawTextW
GetDialogBaseUnits
EndDialog
DialogBoxIndirectParamW
MoveWindow
SendMessageW
comctl32
ord380
kernel32
GetACP
IsValidCodePage
GetStringTypeW
GetFileAttributesExW
SetEnvironmentVariableW
FlushFileBuffers
GetCurrentDirectoryW
LCMapStringW
CompareStringW
FlsFree
GetOEMCP
GetCPInfo
GetModuleHandleW
MulDiv
FormatMessageW
GetLastError
GetModuleFileNameW
LoadLibraryExW
SetDllDirectoryW
CreateSymbolicLinkW
GetProcAddress
GetEnvironmentStringsW
GetCommandLineW
GetEnvironmentVariableW
ExpandEnvironmentStringsW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetDriveTypeW
RemoveDirectoryW
GetTempPathW
CloseHandle
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
Sleep
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
FreeLibrary
LocalFree
SetConsoleCtrlHandler
K32EnumProcessModules
K32GetModuleFileNameExW
CreateFileW
FindFirstFileExW
GetFinalPathNameByHandleW
MultiByteToWideChar
WideCharToMultiByte
FlsSetValue
FreeEnvironmentStringsW
GetProcessHeap
GetTimeZoneInformation
HeapSize
HeapReAlloc
WriteConsoleW
SetEndOfFile
CreateDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
RaiseException
RtlPcToFileHeader
GetCommandLineA
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ReadFile
GetFullPathNameW
SetStdHandle
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
HeapFree
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleOutputCP
GetFileSizeEx
HeapAlloc
FlsAlloc
FlsGetValue
advapi32
OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
gdi32
SelectObject
DeleteObject
CreateFontIndirectW
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
bsod.pyc