C:\CodeBases\isdev\redist\Language Independent\i386\ISP\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Virus.Infector.ATA_virussign.com_2ed420df331eb3f2ddeacfea99d1229c.exe
Resource
win7-20240704-en
General
-
Target
Virus.Infector.ATA_virussign.com_2ed420df331eb3f2ddeacfea99d1229c.exe
-
Size
1.2MB
-
MD5
2ed420df331eb3f2ddeacfea99d1229c
-
SHA1
7a5651296fd40e0015432133aeb92892e4d0cbd7
-
SHA256
2badff2b4c5f2bd4a0a40b75086a1a4d723ebb5d5d477fb7fdd9ba7a028903c9
-
SHA512
9f839f5274a2e900c99f2fa6b94416c54267efa958fc002d56ea3f1b204228a24418c577e3a424500329c9dc720f87826e147a72e4505113ca8d76074ad52045
-
SSDEEP
24576:vmDz2LDKKw58+fIux+icN4E0CwDllllZSVhHeqyCW60t3:uDzeTw58+fIugDEPllllUVhJIh9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Virus.Infector.ATA_virussign.com_2ed420df331eb3f2ddeacfea99d1229c.exe
Files
-
Virus.Infector.ATA_virussign.com_2ed420df331eb3f2ddeacfea99d1229c.exe.exe windows:5 windows x86 arch:x86
ff51d8e277d6e1cc3835113dfac0fcb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ord17
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
lz32
LZClose
LZOpenFileW
LZCopy
msi
ord88
ord169
ord137
ord141
ord8
ord17
ord125
ord171
kernel32
VirtualQuery
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FindResourceExW
FreeLibrary
LoadLibraryExW
lstrcmpiW
lstrcpynW
lstrcatW
LoadLibraryW
GetPrivateProfileIntW
IsBadReadPtr
CompareStringW
CompareStringA
GetSystemDefaultLangID
GetUserDefaultLangID
ExpandEnvironmentStringsW
GetCurrentDirectoryW
FileTimeToLocalFileTime
GetFileTime
SetFileAttributesW
HeapAlloc
HeapFree
GetProcessHeap
CopyFileW
GetSystemInfo
GetSystemTimeAsFileTime
CreateEventW
CreateMutexW
ReleaseMutex
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
QueryPerformanceFrequency
SetErrorMode
RaiseException
WriteFile
SetFilePointer
GetFileSize
GetFileAttributesW
GetDriveTypeW
GetDiskFreeSpaceW
FindFirstFileW
FindClose
CreateDirectoryW
VerLanguageNameW
IsValidLocale
FreeResource
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcatA
lstrcmpiA
LoadResource
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringW
SetConsoleCtrlHandler
SetFilePointerEx
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
HeapReAlloc
GetStdHandle
HeapSize
AreFileApisANSI
GetModuleHandleExW
GetStringTypeW
GetCurrentThreadId
GetCPInfo
GetOEMCP
IsValidCodePage
CreateSemaphoreW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FatalAppExitA
GetLocaleInfoW
WideCharToMultiByte
lstrcpyA
GetTickCount
ExitThread
CreateThread
GetExitCodeProcess
ReadFile
GetCommandLineW
FormatMessageW
LocalFree
GetVersionExW
GetWindowsDirectoryW
InterlockedDecrement
InterlockedIncrement
GetTempPathW
CreateFileW
FindResourceW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SizeofResource
LockResource
SetLastError
GetLastError
DuplicateHandle
RemoveDirectoryW
DeleteFileW
SetCurrentDirectoryW
lstrlenW
lstrcpyW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
CreateProcessW
Sleep
CloseHandle
GetACP
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
InterlockedExchange
lstrcpynA
LocalAlloc
FindNextFileW
WritePrivateProfileSectionW
GetPrivateProfileSectionW
lstrcmpW
GetShortPathNameW
GetCurrentThread
ReadConsoleW
QueryPerformanceCounter
SearchPathW
lstrcmpA
SystemTimeToFileTime
ResetEvent
SetEvent
VirtualProtect
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetDateFormatW
GetTimeFormatW
GetTempFileNameW
GetEnvironmentVariableW
CompareFileTime
SetFileTime
MultiByteToWideChar
MoveFileExW
WriteProcessMemory
VirtualProtectEx
GetSystemDirectoryW
FlushInstructionCache
SetThreadContext
GetThreadContext
ResumeThread
TerminateProcess
ExitProcess
GetCurrentProcess
MulDiv
WaitForSingleObject
OpenProcess
GetProcessTimes
lstrlenA
GetLocalTime
GetCurrentProcessId
GetVersion
LCMapStringW
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
user32
GetDlgItem
EndDialog
SetDlgItemTextW
MoveWindow
SendMessageW
CharUpperBuffW
SetActiveWindow
SetForegroundWindow
SetWindowTextW
GetWindowRect
MessageBoxW
GetWindowLongW
SetWindowLongW
wsprintfW
DialogBoxIndirectParamW
WaitForInputIdle
SystemParametersInfoW
GetWindow
FillRect
GetSysColor
MapWindowPoints
RemovePropW
GetPropW
SetPropW
EndPaint
BeginPaint
EnableMenuItem
GetSystemMetrics
SetFocus
DefWindowProcW
GetMessageW
LoadStringW
LoadImageW
ReleaseDC
GetDC
CreateDialogParamW
GetParent
GetWindowTextW
CharNextW
GetDesktopWindow
GetClientRect
IsWindowEnabled
CreateDialogIndirectParamW
IsWindowVisible
LoadIconW
FindWindowExW
ScreenToClient
EnableWindow
MsgWaitForMultipleObjects
SendDlgItemMessageW
SetWindowPos
ShowWindow
DestroyWindow
IsWindow
ExitWindowsEx
CharUpperW
wsprintfA
CallWindowProcW
CreateWindowExW
DrawIcon
DrawTextW
UpdateWindow
GetWindowDC
InvalidateRect
DrawFocusRect
CopyRect
InflateRect
EnumChildWindows
GetClassNameW
MapDialogRect
RegisterClassExW
GetDlgItemTextW
IntersectRect
MonitorFromPoint
PostMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
IsDialogMessageW
gdi32
SetPixel
TextOutW
SetTextColor
SetBkMode
SetBkColor
SaveDC
RestoreDC
CreateSolidBrush
UnrealizeObject
CreateHalftonePalette
GetDIBColorTable
SelectPalette
SelectObject
RealizePalette
GetSystemPaletteEntries
GetDeviceCaps
DeleteDC
CreatePalette
CreateCompatibleDC
BitBlt
GetObjectW
TranslateCharsetInfo
DeleteObject
CreateFontIndirectW
CreateCompatibleBitmap
CreateDCW
CreatePatternBrush
GetStockObject
GetTextExtentPoint32W
DeleteMetaFile
CreateDIBitmap
CreateBitmap
CreateRectRgn
PatBlt
PlayMetaFile
SelectClipRgn
SetMapMode
SetMetaFileBitsEx
StretchBlt
SetStretchBltMode
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
advapi32
RegQueryInfoKeyW
RegCreateKeyExW
CryptVerifySignatureW
CryptSignHashW
CryptHashData
CryptCreateHash
CryptAcquireContextW
FreeSid
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenThreadToken
RegEnumKeyW
RegCreateKeyW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyW
RegEnumValueW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegCloseKey
shell32
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
ole32
StringFromGUID2
CoCreateGuid
CoLoadLibrary
CreateItemMoniker
GetRunningObjectTable
CoUninitialize
CoInitializeEx
ProgIDFromCLSID
CreateStreamOnHGlobal
CoInitializeSecurity
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
oleaut32
SysAllocStringByteLen
LoadTypeLi
RegisterTypeLi
SetErrorInfo
CreateErrorInfo
VarBstrCmp
SysAllocString
SysFreeString
SysStringLen
SysAllocStringLen
SysReAllocStringLen
GetErrorInfo
SysStringByteLen
VariantClear
VariantInit
VariantChangeType
VarBstrCat
VarUI4FromStr
crypt32
CertOpenSystemStoreW
CryptAcquireCertificatePrivateKey
CryptImportPublicKeyInfo
CertCompareCertificate
CertAddCertificateContextToStore
CertGetCertificateContextProperty
CertSetCertificateContextProperty
CertGetIssuerCertificateFromStore
CertFindCertificateInStore
CertEnumCertificatesInStore
CertSaveStore
CertOpenStore
PFXImportCertStore
rpcrt4
UuidCreate
UuidToStringW
UuidFromStringW
RpcStringFreeW
gdiplus
GdipGetImageWidth
GdipGetImageHeight
GdipAlloc
GdipFree
GdiplusStartup
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromResource
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
Sections
.text Size: 686KB - Virtual size: 686KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE