Static task
static1
Behavioral task
behavioral1
Sample
Pantum M7100-M7200-M29-L2710 Series Windows Driver V2_8_30 CD.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Pantum M7100-M7200-M29-L2710 Series Windows Driver V2_8_30 CD.exe
Resource
win10v2004-20240802-en
General
-
Target
Pantum M7100-M7200-M29-L2710 Series Windows Driver V2_8_30 CD.exe
-
Size
57.8MB
-
MD5
0c1a69a847826ca9158b31df47bdca66
-
SHA1
f5622193182f86e79eea8d625a42861fda9e87f7
-
SHA256
96306f9abd8c057f87eaef9638782a12f792b9ccd9ff245ccb1b30e70dde234b
-
SHA512
16ea8439dae2a9a6420ce4aa9432ada8b98186f89dba50d34eead42ba627a338debf006e65f6f1c61450d31ebcd03fd7e6fd86407312ab7810911042642e3d06
-
SSDEEP
1572864:I787os3BWkTeGuQ2PfdQNJLl/noMfDTfe:kgrxWkT5uLQNH/fbi
Malware Config
Signatures
Files
-
Pantum M7100-M7200-M29-L2710 Series Windows Driver V2_8_30 CD.exe.exe windows:5 windows x86 arch:x86
0ac29b211097b42108cd35e880692227
Code Sign
01Certificate
IssuerCN=Microsoft Authenticode(tm) Root Authority,O=MSFT,C=USNot Before01/01/1995, 08:00Not After31/12/1999, 23:59SubjectCN=Microsoft Authenticode(tm) Root Authority,O=MSFT,C=USc1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation61:1c:b2:8a:00:00:00:00:00:26Certificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before15/04/2011, 19:41Not After15/04/2021, 19:51SubjectCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
79:ad:16:a1:4a:a0:a5:ad:4c:73:58:f4:07:13:2e:65Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before09/05/2001, 23:19Not After09/05/2021, 23:28SubjectCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dKey Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9Certificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before29/04/2021, 00:00Not After28/04/2036, 23:59SubjectCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
72:94:04:10:1f:3e:0c:a3:47:83:7f:ca:17:5a:84:38Certificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before01/11/2005, 13:46Not After01/11/2025, 13:54SubjectCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
0a:40:5c:dd:b4:11:68:04:d6:d5:dd:b3:a3:66:33:b7Certificate
IssuerCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USNot Before21/10/2021, 00:00Not After11/10/2024, 23:59SubjectSERIALNUMBER=91440400324837464A,CN=Zhuhai Pantum Electronics Co.\, Ltd.,O=Zhuhai Pantum Electronics Co.\, Ltd.,L=珠海市,ST=广东省,C=CN,1.3.6.1.4.1.311.60.2.1.2=#0c09e5b9bfe4b89ce79c81,1.3.6.1.4.1.311.60.2.1.3=#1302434e,2.5.4.15=#131450726976617465204f7267616e697a6174696f6eExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
05:44:af:f3:94:9d:08:39:a6:bf:db:3f:5f:e5:61:16Certificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before14/07/2023, 00:00Not After13/10/2034, 23:59SubjectCN=DigiCert Timestamp 2023,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
68:fa:57:fa:d2:22:c5:51:bc:ba:91:36:26:6d:38:53:b4:97:23:f5:e8:c0:82:ce:88:1d:70:a0:4d:8f:c9:fdSigner
Actual PE Digest68:fa:57:fa:d2:22:c5:51:bc:ba:91:36:26:6d:38:53:b4:97:23:f5:e8:c0:82:ce:88:1d:70:a0:4d:8f:c9:fdDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetLastError
CreateProcessW
GetStartupInfoW
GetCommandLineW
SetLastError
GetDiskFreeSpaceExW
SetFileAttributesW
Sleep
GetExitCodeThread
CreateThread
SystemTimeToFileTime
GetLocalTime
GetFileAttributesW
CreateDirectoryW
lstrlenA
WriteFile
GetStdHandle
GetModuleHandleW
LockResource
LoadResource
SizeofResource
FindResourceExA
MulDiv
GlobalFree
GlobalAlloc
lstrcmpiA
GetSystemDefaultUILanguage
GetSystemDefaultLCID
GetUserDefaultUILanguage
MultiByteToWideChar
GetLocaleInfoW
lstrcmpiW
GetEnvironmentVariableW
SetCurrentDirectoryW
lstrcmpW
RemoveDirectoryW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
CreateJobObjectW
GetTempPathW
WideCharToMultiByte
CompareFileTime
ExpandEnvironmentStringsW
GetSystemTimeAsFileTime
SetThreadLocale
LoadLibraryA
SetEnvironmentVariableW
CreateFileW
GetDriveTypeW
SetProcessWorkingSetSize
GetCurrentProcess
GetModuleFileNameW
GetVersionExW
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
GetCurrentThreadId
GetSystemDirectoryW
TerminateThread
SuspendThread
IsBadReadPtr
LocalFree
lstrcpyW
FormatMessageW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
GetFileSize
SetFilePointer
ReadFile
SetFileTime
SetEndOfFile
GetFileInformationByHandle
WaitForMultipleObjects
GetModuleHandleA
ResumeThread
AssignProcessToJobObject
CreateIoCompletionPort
SetInformationJobObject
GetQueuedCompletionStatus
WaitForSingleObject
CloseHandle
GetExitCodeProcess
GetProcAddress
lstrcatW
ExitProcess
lstrlenW
OutputDebugStringA
OutputDebugStringW
GetTickCount
GetCurrentDirectoryW
GetStartupInfoA
user32
wvsprintfW
MessageBoxW
wsprintfW
GetParent
BringWindowToTop
ShowWindow
SendMessageW
CharUpperW
KillTimer
EndDialog
DispatchMessageW
GetMessageW
SetTimer
SetWindowPos
GetWindowRect
GetDesktopWindow
CreateWindowExW
CreateWindowExA
GetSystemMenu
EnableMenuItem
EnableWindow
MessageBeep
LoadIconW
LoadImageW
SetWindowsHookExW
PtInRect
CallNextHookEx
DefWindowProcW
CallWindowProcW
DrawIconEx
DialogBoxIndirectParamW
GetWindow
ClientToScreen
GetDC
DrawTextW
SystemParametersInfoW
GetSystemMetrics
SetFocus
UnhookWindowsHookEx
SetWindowLongW
GetClientRect
GetDlgItem
IsWindow
GetKeyState
MessageBoxA
DestroyWindow
GetSysColor
SetWindowTextW
GetWindowTextLengthW
GetWindowTextW
wsprintfA
GetClassNameA
GetWindowLongW
GetMenu
GetWindowDC
ScreenToClient
CopyImage
wvsprintfA
ReleaseDC
gdi32
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetDeviceCaps
DeleteObject
CreateFontIndirectW
SetStretchBltMode
StretchBlt
GetCurrentObject
GetObjectW
DeleteDC
advapi32
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
shell32
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteW
ole32
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
SysAllocStringLen
SysFreeString
OleLoadPicture
SysAllocString
VariantClear
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
realloc
wcsstr
free
malloc
_CxxThrowException
wcscmp
_beginthreadex
_EH_prolog
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
strncmp
wcsncmp
wcsncpy
strncpy
_wcsnicmp
memcpy
memmove
memset
_wtol
??2@YAPAXI@Z
memcmp
_purecall
??3@YAXPAX@Z
_except_handler3
_controlfp
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ