G:\cc-builds\apmclients724x-win\1456827\src\rh\TerminalProxy\MSI\setupstub\out\Release\setupstub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
46d67cc2660eca7527afee6214b7fb905b1118447bda637e9333c372a919afdc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46d67cc2660eca7527afee6214b7fb905b1118447bda637e9333c372a919afdc.exe
Resource
win10v2004-20240802-en
General
-
Target
46d67cc2660eca7527afee6214b7fb905b1118447bda637e9333c372a919afdc
-
Size
14.0MB
-
MD5
977e86812519a80acf638cc913b2a84c
-
SHA1
217470d7208d724ec81ffc7f6d0abac10b1a1d17
-
SHA256
46d67cc2660eca7527afee6214b7fb905b1118447bda637e9333c372a919afdc
-
SHA512
8bc2f6bf456c9b89c7ff2390b4fed3550a2866e8ded0ed32fc032e81559904de6855fbedfdae7c42d53c7723cbcd686e3dc581403b8e2a113b66ee8c455a69e0
-
SSDEEP
393216:I/3nMDD5MW7dW75Tq9skHrDvQ2PxLmRCQwI+aIsLea5CjSRfS3UNk:I/3MhMSW75T2fIGxKRCQwI+ahQjEfST
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46d67cc2660eca7527afee6214b7fb905b1118447bda637e9333c372a919afdc
Files
-
46d67cc2660eca7527afee6214b7fb905b1118447bda637e9333c372a919afdc.exe windows:6 windows x86 arch:x86
77e82d910b00f5dda4227cfbcd1516ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
kernel32
GetCurrentProcess
GetCurrentProcessId
GetExitCodeProcess
GetCurrentThreadId
CreateProcessA
GetSystemInfo
GetSystemTime
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleExA
GetProcAddress
LoadLibraryA
LocalAlloc
LocalFree
FormatMessageA
lstrcmpA
lstrlenA
CopyFileA
VerifyVersionInfoW
MultiByteToWideChar
WideCharToMultiByte
GetLocaleInfoA
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetFullPathNameA
SetDefaultDllDirectories
lstrcpynA
lstrcpyA
lstrcatA
CompareStringA
GlobalAlloc
GlobalFree
VirtualProtect
VirtualQuery
GetModuleHandleW
LoadLibraryExA
GlobalUnlock
GlobalLock
FileTimeToLocalFileTime
GetFileTime
LocalFileTimeToFileTime
SetEndOfFile
SetFilePointer
SetFileTime
GetVolumeInformationA
GetLocalTime
GetVersion
DosDateTimeToFileTime
SetVolumeLabelA
FileTimeToSystemTime
SystemTimeToFileTime
lstrcmpiA
CreateDirectoryW
GetFileAttributesExW
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExA
GetFullPathNameW
GetCurrentDirectoryW
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeZoneInformation
ReadConsoleW
ReadFile
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
HeapReAlloc
SetStdHandle
WriteConsoleW
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
GetCommandLineW
GetCommandLineA
GetFileType
CreateEventA
CreateMutexA
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapFree
HeapAlloc
QueryPerformanceCounter
GetLastError
RaiseException
CloseHandle
DecodePointer
OutputDebugStringA
GetTempPathA
SetFileAttributesW
SetFileAttributesA
RemoveDirectoryA
GetLongPathNameA
GetFileAttributesA
FlushFileBuffers
FindNextFileA
FindFirstFileA
FindClose
DeleteFileW
DeleteFileA
CreateFileW
CreateFileA
CreateDirectoryA
VerSetConditionMask
GetDriveTypeA
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
WaitForSingleObjectEx
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
EncodePointer
OutputDebugStringW
IsDebuggerPresent
user32
DispatchMessageA
PeekMessageA
DefWindowProcA
DestroyWindow
ShowWindow
TranslateMessage
SetWindowTextA
GetWindowRect
GetWindowLongA
SetWindowLongA
ExitWindowsEx
CharPrevA
LoadStringA
CreateDialogParamA
LoadIconA
OemToCharA
CharNextA
wsprintfA
MsgWaitForMultipleObjects
SystemParametersInfoA
IsDialogMessageA
SetForegroundWindow
GetSystemMetrics
SetFocus
SetDlgItemTextA
GetDlgItem
MoveWindow
WaitMessage
PostMessageA
SendMessageA
MessageBoxA
advapi32
LookupPrivilegeValueA
SetKernelObjectSecurity
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetKernelObjectSecurity
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
FreeSid
AllocateAndInitializeSid
OpenProcessToken
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ole32
CoTaskMemFree
CoCreateGuid
StringFromGUID2
Sections
.text Size: 278KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ