D:\msc-v-sange\dist\package\ColorSelector\installer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
222943a5c015961590f32b7dcbc1b8d0804f509abb9d47a2bba50c91bb56376d.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
222943a5c015961590f32b7dcbc1b8d0804f509abb9d47a2bba50c91bb56376d.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
222943a5c015961590f32b7dcbc1b8d0804f509abb9d47a2bba50c91bb56376d.exe
Resource
win10v2004-20240802-en
General
-
Target
19274239638.zip
-
Size
1.5MB
-
MD5
3e5c1a020a06fe65c88f37ae91daff28
-
SHA1
fced78d6fd16f738ae141ee130610c4910f0d961
-
SHA256
8df59b170cd8a3a6eacf09754caf80c73599b4810ac6a4e611cf8c5c2cab7e9e
-
SHA512
9635973f1cf7e0f1a225bba18ec2fd2c5a40b65b97c90a7e79e16dd5594553e775d6b565b092b7f081f38d9a537ddc0898877622360abfe9f4178995ef640581
-
SSDEEP
49152:TYpZiMlFMbvVmzBNJwqfI8+7+mWkOreke8ne3oO:TYpZiMlWI9Yt8opWkOrekxntO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/222943a5c015961590f32b7dcbc1b8d0804f509abb9d47a2bba50c91bb56376d
Files
-
19274239638.zip.zip
Password: infected
-
222943a5c015961590f32b7dcbc1b8d0804f509abb9d47a2bba50c91bb56376d.exe windows:5 windows x86 arch:x86
fe435f99447435f191ecd3c22fcb0a5a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
GetModuleHandleW
lstrcmpiW
Sleep
SetEvent
FreeLibrary
LoadLibraryExW
GetCommandLineW
FlushViewOfFile
InterlockedCompareExchange
GetProcessHeap
OutputDebugStringW
OutputDebugStringA
WaitForSingleObjectEx
WaitForSingleObject
WriteFile
WideCharToMultiByte
UnmapViewOfFile
UnlockFileEx
UnlockFile
SystemTimeToFileTime
SetFilePointer
SetEndOfFile
ReadFile
QueryPerformanceCounter
MapViewOfFile
LockFileEx
LockFile
LocalFree
LoadLibraryW
LoadLibraryA
HeapCompact
HeapValidate
HeapSize
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GetVersionExW
GetVersionExA
GetTickCount
GetTempPathW
GetTempPathA
GetSystemTimeAsFileTime
GetSystemTime
GetSystemInfo
GetFullPathNameW
GetFullPathNameA
GetFileSize
GetFileAttributesExW
GetFileAttributesW
GetFileAttributesA
GetDiskFreeSpaceW
GetDiskFreeSpaceA
GetCurrentProcessId
FormatMessageW
FormatMessageA
FlushFileBuffers
DeleteFileW
DeleteFileA
CreateMutexW
CreateFileMappingW
CreateFileMappingA
CreateFileW
GetLastError
DeleteCriticalSection
AreFileApisANSI
InitializeCriticalSection
TryEnterCriticalSection
MoveFileA
CreateEventW
LocalAlloc
lstrcatW
GetEnvironmentVariableW
lstrcatA
lstrcpyA
WaitForDebugEvent
ContinueDebugEvent
SetEnvironmentVariableA
CompareStringW
LCMapStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStdHandle
ExitProcess
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
VirtualQuery
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
CreateThread
ExitThread
DecodePointer
EncodePointer
RtlUnwind
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
FindResourceExW
SizeofResource
GlobalHandle
GlobalFree
SetLastError
GlobalLock
GlobalUnlock
GetModuleFileNameW
MulDiv
lstrcmpW
lstrlenW
LoadResource
LockResource
lstrlenA
CloseHandle
MultiByteToWideChar
FindResourceW
GlobalAlloc
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
CreateFileA
RaiseException
user32
SetWindowPos
DefWindowProcW
GetDlgItem
ShowWindow
ScreenToClient
GetWindowRect
MoveWindow
SetWindowTextW
SendMessageW
GetWindowLongW
SetWindowLongW
UnregisterClassA
DestroyWindow
GetParent
GetCapture
PostMessageW
GetActiveWindow
DialogBoxIndirectParamW
PostThreadMessageW
CharUpperW
GetSysColorBrush
CreateDialogIndirectParamW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
RegisterClassExW
LoadCursorW
GetClassInfoExW
IsWindow
SetFocus
GetFocus
DestroyAcceleratorTable
GetDesktopWindow
BeginPaint
EndPaint
CallWindowProcW
FillRect
ReleaseCapture
GetClassNameW
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ClientToScreen
GetClientRect
CharNextW
GetSysColor
SetWindowContextHelpId
GetWindow
SendDlgItemMessageW
CreateWindowExW
MapDialogRect
EndDialog
CreateAcceleratorTableW
gdi32
GetPixel
SetPixel
CreatePen
MoveToEx
LineTo
GetStockObject
GetObjectW
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
LPtoDP
advapi32
RegEnumKeyExW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
ole32
CoReleaseServerProcess
CoAddRefServerProcess
CoTaskMemFree
CoRevokeClassObject
CoUninitialize
CoInitialize
CoTaskMemRealloc
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
oleaut32
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
SysAllocString
SysAllocStringLen
SysFreeString
VarUI4FromStr
SysStringLen
Sections
.text Size: 878KB - Virtual size: 878KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ