D:\BranchAI\win\Release\stubs\x86u\ExternalUi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5c14a07f797f68d87f554565f35e64a5e05dc7cbb9ed822ea15beed40b9965a8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5c14a07f797f68d87f554565f35e64a5e05dc7cbb9ed822ea15beed40b9965a8N.exe
Resource
win10v2004-20240802-en
General
-
Target
5c14a07f797f68d87f554565f35e64a5e05dc7cbb9ed822ea15beed40b9965a8N
-
Size
1.3MB
-
MD5
a0a0a44c7e2e33f0b3b66ab629d95300
-
SHA1
a64c971e6bed884ebab71d9d4203d8e58870e95a
-
SHA256
5c14a07f797f68d87f554565f35e64a5e05dc7cbb9ed822ea15beed40b9965a8
-
SHA512
09d8c5a83f170edc9bed53261c079c7156cac5292ff789168df2a9470e7a8a70a530ef42e56548581734d2d7ebdd4c2857ab87c36aa0e880705528dfcea377c5
-
SSDEEP
24576:aPIDn0ZywkSPzQr3XkGNH/R1obtJQDsj+DWb7bb+D+xrXbFMCOOQ4RsSs:aPIDnIyePz6kcj6DQwj+D0z+SxrLFMCq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c14a07f797f68d87f554565f35e64a5e05dc7cbb9ed822ea15beed40b9965a8N
Files
-
5c14a07f797f68d87f554565f35e64a5e05dc7cbb9ed822ea15beed40b9965a8N.exe windows:5 windows x86 arch:x86
76cff36772269fba03f9f4d212567221
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcmpW
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
GetLastError
CompareStringW
GetDriveTypeW
lstrcmpiW
lstrlenW
FreeLibrary
LoadLibraryW
CreateDirectoryW
CreateFileW
WriteFile
CreateMutexW
GetFileSize
SetStdHandle
WriteConsoleW
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetConsoleMode
GetConsoleCP
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
IsValidCodePage
GetCurrentProcessId
GetACP
HeapCreate
LCMapStringW
ReadFile
GetCPInfo
RtlUnwind
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoW
IsDebuggerPresent
UnhandledExceptionFilter
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
PeekNamedPipe
OpenEventW
TerminateProcess
OpenProcess
SearchPathW
GetLocaleInfoA
GetStringTypeW
ConnectNamedPipe
CreateNamedPipeW
ResetEvent
MoveFileW
TerminateThread
GetEnvironmentVariableW
GetSystemDirectoryW
GetLocalTime
OutputDebugStringW
GlobalMemoryStatus
GetVersion
GetWindowsDirectoryW
GetUserDefaultLangID
GetSystemDefaultLangID
GetLocaleInfoW
EnumResourceLanguagesW
SetEndOfFile
SetCurrentDirectoryW
GetCommandLineW
GlobalFree
GetTempPathW
GetTempPathA
GetSystemTime
GetTempFileNameW
DeleteFileW
GetTempFileNameA
DeleteFileA
FindFirstFileW
RemoveDirectoryW
FindNextFileW
WaitForMultipleObjects
GetSystemInfo
InterlockedExchange
WideCharToMultiByte
LoadLibraryExW
MultiByteToWideChar
FindClose
CopyFileW
SetFileAttributesW
CreateFileA
GetFileAttributesW
LCMapStringA
GetLogicalDriveStringsW
CloseHandle
GetExitCodeThread
SetEvent
CreateEventW
SetLastError
Sleep
GetCurrentThreadId
MulDiv
WaitForSingleObject
lstrcpynW
FindResourceExW
FindResourceW
UnlockFile
LockFile
GetExitCodeProcess
CreateProcessA
CreateProcessW
DuplicateHandle
LoadResource
GetModuleFileNameA
FlushFileBuffers
SetFilePointer
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetStdHandle
SetConsoleTextAttribute
GetCurrentThread
GetDiskFreeSpaceExW
FormatMessageW
GetShortPathNameW
GetFullPathNameW
CreateThread
LockResource
SizeofResource
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetModuleHandleW
GetProcAddress
RaiseException
FlushInstructionCache
GetOEMCP
LocalAlloc
LocalFree
LoadLibraryA
GetVersionExW
SetUnhandledExceptionFilter
GetCurrentProcess
user32
SetForegroundWindow
SetWindowLongW
GetWindowLongW
DefWindowProcW
CallWindowProcW
GetClientRect
MapWindowPoints
GetParent
GetWindow
SendMessageW
GetWindowTextW
GetWindowTextLengthW
FillRect
IsWindow
ShowWindow
GetWindowRect
UnionRect
IsWindowVisible
BeginPaint
EndPaint
ScreenToClient
SetWindowPos
GetWindowDC
DrawFrameControl
RegisterWindowMessageW
InvalidateRgn
GetDesktopWindow
GetKeyState
DrawStateW
DrawTextExW
DrawFocusRect
ValidateRect
DestroyMenu
AppendMenuW
CreatePopupMenu
TrackPopupMenu
InflateRect
LoadBitmapW
CharNextW
GetClassNameW
ReleaseCapture
GetCapture
SetCapture
UpdateWindow
DestroyIcon
GetDlgCtrlID
SetScrollInfo
GetScrollPos
GetClassInfoExW
RegisterClassExW
SetScrollPos
SetRect
MoveWindow
GetScrollInfo
GetMessagePos
GetSysColor
SystemParametersInfoW
GetActiveWindow
TrackMouseEvent
GetAsyncKeyState
DestroyCursor
GetWindowRgn
CopyRect
IsZoomed
SetWindowRgn
GetComboBoxInfo
DestroyAcceleratorTable
CreateAcceleratorTableW
TranslateAcceleratorW
CreateDialogParamW
EndDialog
DialogBoxParamW
InvalidateRect
GetNextDlgTabItem
SetFocus
ReleaseDC
MonitorFromWindow
GetMonitorInfoW
LoadImageW
IsDialogMessageW
IsChild
GetFocus
PostQuitMessage
PostMessageW
SetCursor
SetCursorPos
GetCursorPos
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadCursorW
LoadStringW
MessageBoxW
RedrawWindow
IsWindowEnabled
EnableWindow
DestroyWindow
DrawTextW
DrawIconEx
LoadIconW
DialogBoxIndirectParamW
GetForegroundWindow
GetPropW
GetSystemMenu
EnableMenuItem
MsgWaitForMultipleObjects
ModifyMenuW
FindWindowW
MessageBeep
ExitWindowsEx
GetScrollRange
SetPropW
RemovePropW
LoadMenuW
GetSubMenu
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
GetIconInfo
SendMessageTimeoutW
UnregisterClassA
GetSystemMetrics
ClientToScreen
OffsetRect
SetRectEmpty
PtInRect
GetSysColorBrush
IntersectRect
IsRectEmpty
SendMessageA
CreateWindowExW
GetDlgItem
SetWindowTextW
EqualRect
SetTimer
KillTimer
GetDC
gdi32
GetLayout
GetBrushOrgEx
CreateFontIndirectW
CreateSolidBrush
Rectangle
CreatePen
ExtTextOutW
SetBkColor
GetRgnBox
EqualRgn
CreatePolygonRgn
CreateRectRgnIndirect
GetStockObject
CreateFontW
ExcludeClipRect
SetBkMode
GetBitmapBits
SetBrushOrgEx
CreatePatternBrush
FillRgn
SelectClipRgn
CombineRgn
CreateRectRgn
GetObjectW
GetDeviceCaps
BitBlt
SetViewportOrgEx
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
SelectObject
DeleteDC
CreateDIBSection
CreateBitmapIndirect
SetTextColor
advapi32
LockServiceDatabase
LookupPrivilegeValueW
OpenProcessToken
StartServiceW
QueryServiceStatus
OpenServiceW
RegDeleteValueA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
OpenSCManagerW
AdjustTokenPrivileges
UnlockServiceDatabase
CloseServiceHandle
RegOpenKeyExA
RegEnumValueA
RegOpenKeyW
shell32
SHGetFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetFileInfoW
ShellExecuteW
ShellExecuteExW
ole32
CreateStreamOnHGlobal
CoCreateInstance
OleLockRunning
CLSIDFromProgID
CLSIDFromString
OleInitialize
CoInitializeEx
StringFromGUID2
CoTaskMemAlloc
OleUninitialize
CoUninitialize
CoInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoTaskMemFree
CoTaskMemRealloc
CoGetClassObject
oleaut32
VarDateFromStr
VarUI4FromStr
OleLoadPicture
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
SysStringLen
OleCreateFontIndirect
VariantCopy
VariantInit
VariantClear
SysAllocString
SysFreeString
dbghelp
SymFunctionTableAccess
SymInitialize
SymGetLineFromAddr
SymCleanup
SymSetSearchPath
SymGetModuleBase
SymSetOptions
StackWalk
shlwapi
PathIsDirectoryW
PathAddBackslashW
PathIsUNCW
PathFileExistsW
comctl32
ImageList_GetIcon
ImageList_AddMasked
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Destroy
_TrackMouseEvent
ImageList_Add
ImageList_Create
DestroyPropertySheetPage
PropertySheetW
CreatePropertySheetPageW
InitCommonControlsEx
ImageList_LoadImageW
msimg32
AlphaBlend
TransparentBlt
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
netapi32
NetUserGetLocalGroups
comdlg32
GetOpenFileNameW
GetSaveFileNameW
Sections
.text Size: 912KB - Virtual size: 912KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ