D:\projects\standalone_distrib\testing\windows-setup\starter\starter\Release\setup-starter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb6fdcf215d04a1ae1572dfd8d2dbc017af3758084b6413831e53f0de5977de2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb6fdcf215d04a1ae1572dfd8d2dbc017af3758084b6413831e53f0de5977de2.exe
Resource
win10v2004-20241007-en
General
-
Target
fb6fdcf215d04a1ae1572dfd8d2dbc017af3758084b6413831e53f0de5977de2
-
Size
10.0MB
-
MD5
5cee406e4742c7ccc9be5737dc65dca7
-
SHA1
5caf4fc569d6599ae6454ef5e4a6481881b97cc0
-
SHA256
fb6fdcf215d04a1ae1572dfd8d2dbc017af3758084b6413831e53f0de5977de2
-
SHA512
85cadb4685d0537640559740ffd54daaff6253d4dab2e26c15e49d702ec38acdc50d074beeb0775da0c047f35bfbe7c47d162999e6006a2139c97a0b8f42d0b5
-
SSDEEP
196608:wmJ5zaGYkYz1oVY2gJO9+q9KhF8rzjGCsIaxurw6KOIaM:/JlaGYkq1oX39CWrzCxYxKF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb6fdcf215d04a1ae1572dfd8d2dbc017af3758084b6413831e53f0de5977de2
Files
-
fb6fdcf215d04a1ae1572dfd8d2dbc017af3758084b6413831e53f0de5977de2.exe windows:5 windows x86 arch:x86
aa1583a8ad463eb46d6f3be4c08c6657
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtect
GetProcAddress
GetModuleHandleW
VirtualQuery
GetVersionExW
SetLastError
GetHandleInformation
RemoveDirectoryW
GetUserDefaultLangID
WaitForMultipleObjects
WaitForSingleObject
CreateFileW
CreateEventW
GetLastError
SetEvent
CloseHandle
CreateProcessW
GetTickCount
GetExitCodeProcess
DeviceIoControl
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
RaiseException
ResetEvent
DecodePointer
DeleteCriticalSection
FindResourceExW
LoadResource
CreateDirectoryW
ReadFile
SizeofResource
FindFirstFileW
HeapFree
VirtualFree
FindNextFileW
GetCurrentProcess
WriteFile
ExpandEnvironmentStringsW
GetShortPathNameW
VirtualAlloc
TerminateProcess
GetModuleFileNameW
SetEndOfFile
GetTempPathW
FindClose
GetFileAttributesW
GetSystemDirectoryW
UnmapViewOfFile
FreeResource
SetFileAttributesW
MultiByteToWideChar
LockResource
DeleteFileW
FindResourceW
HeapAlloc
GetWindowsDirectoryW
SetFilePointerEx
MoveFileExW
GetFileSize
GetProcessHeap
WideCharToMultiByte
GetFileType
CreateFileMappingW
MapViewOfFile
FlushFileBuffers
Sleep
SetFilePointer
MapViewOfFileEx
FlushViewOfFile
GetCurrentProcessId
LocalAlloc
LocalFree
LoadLibraryW
FreeLibrary
FormatMessageW
lstrlenW
LocalSize
GetSystemInfo
LoadLibraryExW
HeapReAlloc
HeapSize
GetCurrentThread
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCurrentThreadId
GetFileAttributesExW
FormatMessageA
MoveFileW
RestoreLastError
GetStringTypeW
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetExitCodeThread
EncodePointer
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
FindFirstFileExW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateFileMappingA
LoadLibraryExA
WriteConsoleW
SetEnvironmentVariableA
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
ReadConsoleW
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
ExitProcess
GetStdHandle
SetStdHandle
GetModuleHandleExW
ExitThread
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
OutputDebugStringW
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
ntdll
RtlUnwind
Sections
.text Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ