X:\project\installer\setup-3\Release\R_Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
caea2ce4e40a340e100917625ec01dce7193e46deb5b2f50ea29557ced3cc35e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
caea2ce4e40a340e100917625ec01dce7193e46deb5b2f50ea29557ced3cc35e.exe
Resource
win10v2004-20240802-en
General
-
Target
caea2ce4e40a340e100917625ec01dce7193e46deb5b2f50ea29557ced3cc35e
-
Size
6.2MB
-
MD5
8f78fe814e156b137a500f5321ac858c
-
SHA1
12737a195b1cb86eacb442e70dd79f7d64aa28b0
-
SHA256
caea2ce4e40a340e100917625ec01dce7193e46deb5b2f50ea29557ced3cc35e
-
SHA512
5993015d39af90af32ea06dfe74a28378a4ba789d890cbda925a4afbbac9e642d7c9eb1d7fc775a8339bb5814372099018b99898a99f18422c067623ad1bd3f2
-
SSDEEP
98304:+g20UqY7kmoECBotImTvHxAwfDYO7xfjdXiUjKAT4jiS/:+gXgkrECBo+GxzfDYO5dX7VT3C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource caea2ce4e40a340e100917625ec01dce7193e46deb5b2f50ea29557ced3cc35e
Files
-
caea2ce4e40a340e100917625ec01dce7193e46deb5b2f50ea29557ced3cc35e.exe windows:5 windows x86 arch:x86
cae8ca55e293edd78843ce508388c0cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
ioctlsocket
shutdown
htonl
gethostbyname
getservbyname
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAStartup
WSAGetLastError
WSACleanup
gethostname
sendto
recvfrom
listen
accept
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
wldap32
ord46
ord60
ord211
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord143
ord200
ord301
kernel32
TerminateProcess
GetTickCount
GetPrivateProfileIntW
WaitForSingleObject
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameW
GetTempPathW
CreateDirectoryW
FindFirstFileW
FindNextFileW
GetFileAttributesW
SetFileAttributesW
WideCharToMultiByte
OpenFileMappingW
MapViewOfFile
GetLastError
CreateFileMappingW
UnmapViewOfFile
MulDiv
OutputDebugStringW
GetPrivateProfileStringW
MoveFileExW
OutputDebugStringA
GetCommandLineW
LoadLibraryW
VirtualAlloc
VirtualFree
GetModuleHandleA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
CreateEventA
CreateSemaphoreA
AreFileApisANSI
MultiByteToWideChar
LoadLibraryExW
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetCurrentProcessId
GetCurrentThreadId
SetLastError
SetFileTime
GetModuleHandleW
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
RemoveDirectoryA
RemoveDirectoryW
CreateFileW
SetFileAttributesA
DeleteFileA
MoveFileA
MoveFileW
FindClose
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetFileAttributesA
FindFirstFileA
FindNextFileA
GetFileSize
WriteFile
ReadFile
DeviceIoControl
SetEndOfFile
SetFilePointer
CreateFileA
GetFileInformationByHandle
GetDriveTypeA
GetDriveTypeW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetVolumeInformationA
GetCurrentProcess
CloseHandle
FileTimeToSystemTime
GlobalMemoryStatus
GetSystemInfo
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
WaitForMultipleObjects
GetStdHandle
QueryPerformanceCounter
SetProcessAffinityMask
OpenEventA
OpenFileMappingA
GetProcessTimes
SetConsoleCtrlHandler
SetFileApisToOEM
GetConsoleScreenBufferInfo
GetConsoleMode
SetConsoleMode
OpenProcess
lstrcmpiW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LockResource
LoadResource
SizeofResource
FindResourceW
GetDiskFreeSpaceExA
GetVersionExW
GetLocaleInfoA
GetLocalTime
InitializeCriticalSectionEx
SleepEx
SystemTimeToFileTime
GetTickCount64
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
PeekNamedPipe
VerSetConditionMask
VerifyVersionInfoA
FlushConsoleInputBuffer
GetSystemTime
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
ReadConsoleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetModuleHandleExW
ExitProcess
ReadConsoleInputA
SetFilePointerEx
HeapReAlloc
RaiseException
RtlUnwind
IsProcessorFeaturePresent
IsDebuggerPresent
SystemTimeToTzSpecificLocalTime
ExitThread
CreateThread
GetStringTypeW
DecodePointer
EncodePointer
AllocConsole
SetConsoleTitleA
FreeConsole
lstrlenA
IsDBCSLeadByte
GlobalUnlock
GlobalLock
GetNativeSystemInfo
CreateProcessA
MoveFileExA
CopyFileA
QueryDosDeviceA
GetShortPathNameA
HeapFree
GetExitCodeProcess
Sleep
DeleteFileW
GetSystemDefaultLangID
InitializeSListHead
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameW
WaitForMultipleObjectsEx
SetWaitableTimer
ResumeThread
CreateWaitableTimerA
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
GetCurrentThread
IsValidCodePage
GetTimeZoneInformation
FlushFileBuffers
GetConsoleCP
FreeEnvironmentStringsW
HeapAlloc
GetProcessHeap
GetOEMCP
FindFirstFileExW
CompareFileTime
GetACP
SetStdHandle
GetFileAttributesExW
VirtualQuery
GetThreadTimes
GetEnvironmentStringsW
user32
GetProcessWindowStation
GetDesktopWindow
InvalidateRect
ClientToScreen
ReleaseCapture
SetCapture
GetWindowThreadProcessId
PostMessageW
ExitWindowsEx
CharPrevExA
CharUpperW
CharUpperA
GetWindowRgn
DestroyWindow
SetWindowLongW
GetWindowLongW
RegisterClassExW
GetUserObjectInformationW
DefWindowProcW
FindWindowW
GetWindowTextW
MessageBoxW
EndDialog
OffsetRect
MessageBoxA
SendMessageA
LoadIconW
SetWindowTextA
CreateWindowExW
MoveWindow
EnableWindow
wsprintfW
DrawTextA
ReleaseDC
DrawTextW
FillRect
GetClientRect
GetDC
LoadStringW
SetWindowPos
GetSystemMetrics
GetWindowRect
ShowWindow
SetWindowTextW
SendMessageW
GetDlgItem
KillTimer
SetTimer
LoadBitmapW
OpenDesktopA
EnumDesktopWindows
CloseDesktop
PostMessageA
IsWindowVisible
OpenClipboard
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
GetForegroundWindow
SystemParametersInfoA
CharNextA
LoadStringA
LoadCursorW
DialogBoxParamW
gdi32
DeleteObject
GetTextExtentPointW
PtInRegion
CreateRectRgn
CreateDIBSection
CreateFontIndirectW
GetDeviceCaps
DeleteDC
BitBlt
SetTextColor
SetBkMode
CreateSolidBrush
SelectObject
CreateCompatibleDC
SetBitmapBits
CreateCompatibleBitmap
GetBitmapBits
GetObjectW
advapi32
AllocateAndInitializeSid
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegQueryInfoKeyA
RegOpenKeyA
RegEnumValueA
RegSetValueA
RegQueryValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
CheckTokenMembership
DuplicateTokenEx
LookupPrivilegeValueW
FreeSid
AdjustTokenPrivileges
GetFileSecurityW
LookupPrivilegeValueA
SetFileSecurityW
OpenProcessToken
shell32
ShellExecuteExA
ShellExecuteW
SHGetPathFromIDListA
SHBrowseForFolderW
SHGetPathFromIDListW
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteA
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoCreateGuid
CoSetProxyBlanket
CoTaskMemFree
CoInitialize
oleaut32
SysStringLen
SysAllocString
SysAllocStringLen
VariantCopy
SysFreeString
VariantClear
powrprof
SetSuspendState
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
shlwapi
StrCpyNW
StrChrW
StrCmpW
StrCatW
StrRChrW
PathAppendA
PathRemoveFileSpecW
PathFileExistsA
PathIsDirectoryW
StrCpyW
PathFileExistsW
PathAppendW
netapi32
NetApiBufferFree
NetWkstaGetInfo
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
dbghelp
MiniDumpWriteDump
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 692KB - Virtual size: 691KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ