SetIEInstalledDate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
82a4756f5d38095d20c9438037da0ed0N.exe
Resource
win7-20240903-en
General
-
Target
82a4756f5d38095d20c9438037da0ed0N.exe
-
Size
103KB
-
MD5
82a4756f5d38095d20c9438037da0ed0
-
SHA1
ef63ae5c571f126eb0e667ef4a7d664a463c9d74
-
SHA256
b50d6db0e5f3cfc62514f7806a9e5d6281e147fb4e55d3c33fb0d5c692028fa3
-
SHA512
7d8abed9c1a624af00b73f0f7520db11ab0d901f3a07a444f0e615187f4db2352d1e355a81fcb7ff97d330652a0508f806947b54bd5c4dbed0e428b4c97f3044
-
SSDEEP
3072:X3/YQ/qsOgaAdvTAJ5B5UHco/4OqRF+0a8cUyzXW1YbTbN9oc74rZ8JznLHB:fYInd2i660o+YZ9xUoHB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82a4756f5d38095d20c9438037da0ed0N.exe
Files
-
82a4756f5d38095d20c9438037da0ed0N.exe.exe windows:6 windows x86 arch:x86
47f836a123f19be3fe0a5ce54317b2c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExpandEnvironmentStringsW
DecodePointer
GetVersionExA
HeapSize
GetLastError
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
HeapFree
VirtualQuery
MapViewOfFile
CreateFileMappingW
GetFileSize
UnmapViewOfFile
TlsAlloc
GetLocalTime
TlsSetValue
HeapReAlloc
HeapAlloc
TlsGetValue
GetTempFileNameW
GetWindowsDirectoryW
GetFileAttributesW
GetTempPathW
SetLastError
LocalFree
FormatMessageW
RaiseException
ExitProcess
TlsFree
GetWindowsDirectoryA
CloseHandle
GetCurrentThread
ReleaseMutex
WaitForSingleObject
SetFilePointer
WriteFile
GetModuleFileNameA
CreateMutexW
CreateFileW
GetModuleFileNameW
DeleteFileW
GetVersion
GetSystemInfo
CreateMutexA
CreateFileMappingA
CreateFileA
DeleteFileA
LoadLibraryA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleW
GetFileSizeEx
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
IsDebuggerPresent
HeapCreate
HeapDestroy
DeviceIoControl
LocalAlloc
GetEnvironmentVariableW
CompareStringW
GetCommandLineW
IsWow64Process
EncodePointer
msvcrt
??1type_info@@UAE@XZ
malloc
towlower
free
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_wcsnicmp
_wfopen
fgetws
feof
fclose
wcstok
_wtoi
swscanf_s
iswctype
_wcsicmp
memcpy
_purecall
wcsrchr
??2@YAPAXI@Z
__CxxFrameHandler3
memset
??3@YAXPAX@Z
_vsnwprintf
_vsnprintf
advapi32
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
EqualSid
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyW
shell32
CommandLineToArgvW
ord165
dbghelp
MiniDumpWriteDump
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
user32
UnregisterClassA
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE