w:\ITripoli\Self Extract Utility\Src_2005\Executables\Release\SelfExtractorTemplEx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
403441991b5119640fe38f119cbc493ffa0e3740fa2e38092f923ec6e02c23cc.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
403441991b5119640fe38f119cbc493ffa0e3740fa2e38092f923ec6e02c23cc.exe
Resource
win10v2004-20240802-en
General
-
Target
403441991b5119640fe38f119cbc493ffa0e3740fa2e38092f923ec6e02c23cc
-
Size
281KB
-
MD5
4ed4e5f37d8462c2598cc5218f514633
-
SHA1
1773b2dfa641f46a7bc8ff7c96d06bcaf01bb0a0
-
SHA256
403441991b5119640fe38f119cbc493ffa0e3740fa2e38092f923ec6e02c23cc
-
SHA512
88b34fdc5da51744da774ff8db0f943335b689f64bfc6d1f21e599a620ff5db579b0d47b3ab18a68e77b58d4b56620dc0299584aa69ca482c74fc42f5daff411
-
SSDEEP
6144:GKR9bUApa92bt6ZuGIV9jFilk5L1CepQyV:BR9bno92bt6Zq9jFi4L1RDV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 403441991b5119640fe38f119cbc493ffa0e3740fa2e38092f923ec6e02c23cc
Files
-
403441991b5119640fe38f119cbc493ffa0e3740fa2e38092f923ec6e02c23cc.exe windows:4 windows x86 arch:x86
9d9c06172c6315371132e7c4972f320b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_GetIcon
kernel32
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
InterlockedExchange
MultiByteToWideChar
GetLastError
CompareStringA
CompareStringW
lstrlenA
FlushInstructionCache
GetCurrentProcess
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
GetCurrentThreadId
FreeLibrary
LoadLibraryA
SetLastError
LocalFree
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
CloseHandle
GetVolumeInformationA
HeapFree
HeapAlloc
GetProcessHeap
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleA
CreateFileA
ReadFile
WriteFile
SetFilePointer
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateDirectoryA
GetCurrentDirectoryA
GetModuleFileNameA
GetComputerNameA
SetFileTime
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
GetDriveTypeA
GetTickCount
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
SetEnvironmentVariableA
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
Sleep
GetFileType
LocalAlloc
GetACP
GetLocaleInfoA
GetThreadLocale
HeapDestroy
HeapReAlloc
HeapSize
InitializeCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
RtlUnwind
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapCreate
GetStdHandle
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
user32
MessageBoxA
CreateWindowExA
LookupIconIdFromDirectoryEx
RegisterClassExA
DefWindowProcA
CallWindowProcA
GetWindowLongA
DestroyIcon
DestroyWindow
LoadCursorA
GetClassInfoExA
IsWindow
SetWindowLongA
CreateIconFromResourceEx
UnregisterClassA
shell32
SHGetFileInfoA
Shell_NotifyIconA
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ