C:\zoomcode\EP_2017\Bin\Release\NewInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
66efdcdcd13c99add6b8dd2e5c34472ce0de488aa23a88dd0969fd43d5e78e35N.exe
Resource
win7-20240903-en
General
-
Target
66efdcdcd13c99add6b8dd2e5c34472ce0de488aa23a88dd0969fd43d5e78e35N
-
Size
1.2MB
-
MD5
cd1f9a7a1bde4ddc215035c149ce3040
-
SHA1
b232835430f45ede6e6ee1e8429d832fc60ed9f5
-
SHA256
66efdcdcd13c99add6b8dd2e5c34472ce0de488aa23a88dd0969fd43d5e78e35
-
SHA512
be60571eb8a06648e1e13153583f2fda0206515ad31bc852d83abc10ae82d0b6a81d5f3782b636bf1f0c716758c35ca87329149ee6f337d6171f328e27b5430e
-
SSDEEP
24576:WCCOhIJF8Ve1UqCgHRr1r207QTD0s6dm8zHUnXiAEairhIam:7CGYiVeOTEs07QT688z0nrYm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66efdcdcd13c99add6b8dd2e5c34472ce0de488aa23a88dd0969fd43d5e78e35N
Files
-
66efdcdcd13c99add6b8dd2e5c34472ce0de488aa23a88dd0969fd43d5e78e35N.exe windows:5 windows x86 arch:x86
6025ee0bf5cb4fb8ce5f938cc4ae9eec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetModuleBaseNameW
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcessModules
EnumProcesses
shlwapi
PathIsRelativeW
PathFileExistsA
PathRemoveFileSpecW
PathAppendW
PathIsNetworkPathW
PathUnquoteSpacesW
PathAddBackslashW
PathIsPrefixW
StrCmpNIW
PathFileExistsW
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
crypt32
CertGetNameStringW
kernel32
GetLocalTime
GetCurrentProcessId
lstrlenW
FindFirstFileA
FindClose
GetVersionExW
MultiByteToWideChar
DeleteFileW
GetWindowsDirectoryA
WideCharToMultiByte
CreateDirectoryW
SetFileAttributesW
ReadFile
WriteFile
SetFilePointer
TlsSetValue
SetLastError
SetFileTime
LocalFileTimeToFileTime
FreeLibrary
TlsGetValue
DosDateTimeToFileTime
GetTickCount
TlsAlloc
TlsFree
GetModuleFileNameW
IsBadStringPtrW
OpenProcess
IsBadReadPtr
CopyFileW
GetTempPathW
Sleep
MoveFileExW
CreateProcessW
GetTempFileNameW
SetDllDirectoryW
MoveFileW
LoadLibraryExW
ExpandEnvironmentStringsW
LocalFree
CreateMutexW
OpenMutexW
GetModuleHandleW
LeaveCriticalSection
InitializeCriticalSection
FindFirstFileW
FindNextFileW
RemoveDirectoryW
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFilePointerEx
GetFileType
GetFullPathNameW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetStartupInfoW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
SetEndOfFile
HeapReAlloc
GetDriveTypeW
ExitProcess
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
WriteConsoleW
GetCurrentDirectoryW
HeapSize
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
DeleteCriticalSection
GetCurrentThreadId
DecodePointer
RaiseException
WaitForSingleObject
InitializeCriticalSectionEx
CreateDirectoryA
OutputDebugStringW
GetFileAttributesA
GetTempPathA
ExpandEnvironmentStringsA
OutputDebugStringA
GetModuleFileNameA
GetProcessHeap
GetProcAddress
HeapAlloc
GetModuleHandleA
HeapFree
VerifyVersionInfoW
VerSetConditionMask
CloseHandle
GetLastError
GetFileAttributesW
CreateFileW
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
EncodePointer
user32
EndPaint
ShowWindow
LoadCursorW
SetCursor
CopyRect
IntersectRect
GetSysColor
SetRect
CreateWindowExW
GetWindowLongW
GetWindowThreadProcessId
EnumWindows
ReleaseDC
OffsetRect
wvsprintfW
SendMessageW
UnregisterClassW
RegisterClassExW
IsWindow
SetTimer
LoadIconW
CharNextW
InvalidateRect
SystemParametersInfoW
GetParent
BeginPaint
ReleaseCapture
GetClientRect
SetCapture
GetUpdateRect
GetDC
DrawEdge
DrawTextW
IsRectEmpty
LoadStringW
FillRect
SetWindowPos
SendMessageTimeoutW
DefWindowProcW
GetWindowRect
InflateRect
DestroyWindow
PostMessageW
MessageBoxW
PostQuitMessage
FindWindowW
GetMessageW
DispatchMessageW
PtInRect
TranslateMessage
gdi32
CreateCompatibleDC
ExtTextOutW
SelectClipRgn
SaveDC
SetBkColor
RestoreDC
CreateCompatibleBitmap
ExtSelectClipRgn
SetBkMode
SetTextColor
CreateRectRgnIndirect
GetClipBox
SelectObject
CreateFontIndirectW
CreateSolidBrush
MoveToEx
GetObjectW
Rectangle
CreatePen
LineTo
GetTextExtentPoint32W
TextOutW
GetTextMetricsW
GetStockObject
GetObjectType
DeleteObject
advapi32
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExW
RegDeleteValueW
GetUserNameW
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
RegDeleteKeyW
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
shell32
ShellExecuteExW
SHFileOperationA
SHGetFolderPathA
SHFileOperationW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
ShellExecuteW
SHChangeNotify
ole32
PropVariantClear
CoInitialize
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantChangeType
VariantInit
VariantClear
Sections
.text Size: 401KB - Virtual size: 400KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 588KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE