D:\jenkins\workspace\pc-2345mpcsafe-build\RhinoProtect\Publish\OutPut\bin\Win32\release\pdb\2345SafeCenterInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5e92dd16aeed334c3442ef6c09294ec408b04a5ad50fd5e5c7e37e623a91a8dc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e92dd16aeed334c3442ef6c09294ec408b04a5ad50fd5e5c7e37e623a91a8dc.exe
Resource
win10v2004-20241007-en
General
-
Target
5e92dd16aeed334c3442ef6c09294ec408b04a5ad50fd5e5c7e37e623a91a8dc
-
Size
1.6MB
-
MD5
9d83352c116eb9d4d010cf77dfff5f06
-
SHA1
0dc55ed735388cec5603f80088ba7d7b3e52787b
-
SHA256
5e92dd16aeed334c3442ef6c09294ec408b04a5ad50fd5e5c7e37e623a91a8dc
-
SHA512
5107ac94ca03804b25e45e97fc8eec925a6a6005ce6446112110815a4aa334414006e96f842a2e5e5ac578241ff581f3841e3ab1643df2e1136df60273667aa3
-
SSDEEP
49152:MSIwvb8OdhYZdByKoTY+fHTSSF9Pty7ArDz:kwvb84Y70n3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e92dd16aeed334c3442ef6c09294ec408b04a5ad50fd5e5c7e37e623a91a8dc
Files
-
5e92dd16aeed334c3442ef6c09294ec408b04a5ad50fd5e5c7e37e623a91a8dc.exe windows:5 windows x86 arch:x86
b8073527e088d1200ad72a8a24fbad02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
GetModuleFileNameW
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
GetPrivateProfileStringW
DeleteFileW
GetTickCount
MoveFileW
WriteFile
CreateFileW
GetModuleHandleExW
ReleaseMutex
SetFileAttributesW
lstrlenW
ReadFile
SetFilePointer
SetEndOfFile
GetFileSize
GetACP
GlobalMemoryStatusEx
SetEvent
InterlockedExchange
SetLastError
InterlockedExchangeAdd
ExpandEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetVersionExW
GetFileAttributesW
VirtualFree
VirtualProtect
GetExitCodeProcess
GetModuleHandleW
CreateProcessW
GetProcessHeap
LocalFree
HeapAlloc
OpenProcess
WaitForSingleObject
WaitForMultipleObjects
HeapFree
MoveFileExW
SetErrorMode
GetCurrentProcess
OpenMutexW
GetCurrentProcessId
CloseHandle
Sleep
QueryDosDeviceW
VirtualAlloc
GetModuleHandleA
GetThreadTimes
GetDriveTypeW
SearchPathW
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
GetVolumeInformationW
GetDiskFreeSpaceW
MultiByteToWideChar
WideCharToMultiByte
TerminateProcess
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
LoadLibraryExW
GetCurrentThreadId
GetComputerNameExW
SetFileTime
GetFileTime
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateEventW
CreateMutexW
FindNextFileW
FindClose
FileTimeToSystemTime
ResumeThread
RaiseException
DecodePointer
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetCurrentDirectoryW
GetWindowsDirectoryW
CopyFileW
GetTempFileNameW
GetFileSizeEx
FormatMessageW
DeviceIoControl
EncodePointer
GetCPInfo
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
OutputDebugStringW
GetStdHandle
GetFileType
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
CreateThread
ExitThread
FreeLibraryAndExitThread
ExitProcess
GetCurrentThread
HeapReAlloc
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
FlushFileBuffers
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WaitForSingleObjectEx
SetStdHandle
HeapSize
WriteConsoleW
InterlockedDecrement
InterlockedIncrement
PeekNamedPipe
GetExitCodeThread
GetOverlappedResult
WaitNamedPipeW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
ResetEvent
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
DuplicateHandle
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
user32
wsprintfW
advapi32
RegCloseKey
RegCreateKeyExW
RegSetValueExW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ