I:\build\trunk_en_4.0\package\install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
00457e7d148bfe776d51e2613360a705c00b6b68b02c1691806de67bad447971.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00457e7d148bfe776d51e2613360a705c00b6b68b02c1691806de67bad447971.exe
Resource
win10v2004-20240802-en
General
-
Target
00457e7d148bfe776d51e2613360a705c00b6b68b02c1691806de67bad447971
-
Size
10.0MB
-
MD5
927d415ca7b0d66911eb518c4abd5554
-
SHA1
d4eacb58e4f7f31db29bbab5f38913e7c1462a68
-
SHA256
00457e7d148bfe776d51e2613360a705c00b6b68b02c1691806de67bad447971
-
SHA512
172f1ef0e5562a2dc10161c111ef6a17f6ae4e9a143e298c2191e0ba4726717d1d63ec979ae57d3ac7202f506611981eefe22f7791ecd41d0197497db440ee8e
-
SSDEEP
196608:dQlN98juCishi6bOQDrgQ16zs6PF4oCDelEAY8Xnko:dQlN98jHCyTYHzs6dvgMYno
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00457e7d148bfe776d51e2613360a705c00b6b68b02c1691806de67bad447971
Files
-
00457e7d148bfe776d51e2613360a705c00b6b68b02c1691806de67bad447971.exe windows:5 windows x86 arch:x86
e4d353c7bf2abea38288d971e23cd69a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcessId
GlobalAlloc
GlobalFree
CreateMutexW
FreeResource
SetProcessWorkingSetSize
GetCommandLineW
GetLocalTime
GetCurrentThreadId
IsDebuggerPresent
TerminateThread
CreateEventW
DeviceIoControl
GetDriveTypeW
GetLogicalDriveStringsW
GetStartupInfoW
GetVersionExW
GetSystemInfo
GetPriorityClass
TerminateProcess
Module32NextW
Module32FirstW
DuplicateHandle
GetCurrentProcess
CopyFileW
CreateDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetWindowsDirectoryW
OpenProcess
GetExitCodeProcess
CreateProcessW
GetVolumeInformationW
GetDiskFreeSpaceExW
MoveFileExW
RemoveDirectoryW
FindClose
FindNextFileW
SetLastError
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
ReadFile
FreeLibrary
lstrcmpiW
GetModuleFileNameW
DecodePointer
FindFirstFileW
DeleteFileW
CreateFileW
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetTickCount
FindResourceExW
FindResourceW
SizeofResource
LockResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetFilePointerEx
FlushFileBuffers
GetFileType
GetConsoleMode
GetConsoleCP
WriteFile
GetStdHandle
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
GetOEMCP
IsValidCodePage
GetModuleHandleExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetSystemDirectoryW
Sleep
WideCharToMultiByte
MultiByteToWideChar
LocalFree
SetThreadPriority
WaitForSingleObject
ResumeThread
CloseHandle
GetLastError
GetStringTypeW
FindFirstFileExW
GetFileAttributesExW
GetSystemTimeAsFileTime
GetCurrentThread
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
EncodePointer
GetACP
GetFileSize
ExitProcess
MulDiv
GlobalLock
GlobalUnlock
GetUserDefaultUILanguage
CreateThread
ExitThread
LoadLibraryExW
CreateTimerQueue
IsProcessorFeaturePresent
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
user32
ExitWindowsEx
PostQuitMessage
ShowWindow
BringWindowToTop
PostMessageW
SetWindowTextW
SendMessageW
wsprintfW
KillTimer
SetTimer
GetWindowRect
MoveWindow
MonitorFromWindow
GetMonitorInfoW
FindWindowExW
GetGUIThreadInfo
InvalidateRgn
CreateAcceleratorTableW
EnableWindow
ClientToScreen
SetCaretPos
ShowCaret
HideCaret
CreateCaret
wvsprintfW
SetCursor
UnionRect
OffsetRect
LoadCursorW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
SetWindowPos
IsIconic
SetFocus
GetSystemMetrics
SetPropW
GetPropW
GetClientRect
GetWindowLongW
SetWindowLongW
GetParent
GetWindow
LoadImageW
DestroyWindow
IsWindowVisible
CharNextW
GetActiveWindow
GetFocus
GetSysColor
SetCapture
ReleaseCapture
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetCursorPos
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
PtInRect
IsZoomed
SetWindowRgn
MessageBoxW
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
DrawTextW
FillRect
SetRect
GetKeyState
advapi32
DuplicateTokenEx
RegOpenKeyExW
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
SetSecurityInfo
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
RegCreateKeyW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegOpenKeyW
RegDeleteValueW
RegCreateKeyExW
shell32
SHBrowseForFolderW
ord165
SHChangeNotify
SHGetFolderPathW
ShellExecuteExW
SHGetMalloc
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
ole32
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoCreateInstance
wininet
HttpQueryInfoW
InternetCrackUrlW
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetReadFile
gdiplus
GdiplusShutdown
GdiplusStartup
GdipFree
GdipCloneBrush
GdipDeleteBrush
GdipCreateLineBrushI
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetCompositingQuality
GdipSetSmoothingMode
GdipSetPixelOffsetMode
GdipAlloc
GdipSetInterpolationMode
GdipGraphicsClear
GdipDrawImage
GdipDrawImageRectI
GdipDeleteFontFamily
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipGetFamily
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipLoadImageFromStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipSetTextRenderingHint
shlwapi
PathFileExistsW
PathAppendW
psapi
EnumProcessModules
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
comctl32
_TrackMouseEvent
ord17
imm32
ImmReleaseContext
ImmGetVirtualKey
ImmSetCompositionWindow
ImmGetContext
ImmSetCompositionFontW
gdi32
GetTextMetricsW
GetObjectW
SetWindowOrgEx
CreateRoundRectRgn
GetObjectA
CreatePatternBrush
CreateSolidBrush
SetBkMode
SetTextColor
CombineRgn
CreatePenIndirect
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SelectObject
SaveDC
RestoreDC
Rectangle
GetDeviceCaps
GdiFlush
ExtTextOutW
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
RoundRect
SelectClipRgn
ExtSelectClipRgn
SetBkColor
StretchBlt
SetStretchBltMode
CreateDIBSection
MoveToEx
TextOutW
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
Sections
.text Size: 859KB - Virtual size: 858KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 464.9MB - Virtual size: 464.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ