F:\Work\InstallProject\setup\Release\SetupProxyCommon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0cdd32c2993c13f8b5bdab9208a5e7e14df6af57c26700e541918a6b09ec4c27.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cdd32c2993c13f8b5bdab9208a5e7e14df6af57c26700e541918a6b09ec4c27.exe
Resource
win10v2004-20241007-en
General
-
Target
0cdd32c2993c13f8b5bdab9208a5e7e14df6af57c26700e541918a6b09ec4c27
-
Size
10.1MB
-
MD5
98bfa6120395fde2816bf24b3f974974
-
SHA1
7f56dd50648f525ffa171cb23ffd7b93d381a3ee
-
SHA256
0cdd32c2993c13f8b5bdab9208a5e7e14df6af57c26700e541918a6b09ec4c27
-
SHA512
20b6619ded891cc8265e894377da14cda334d95be6e8a618676e470c204074f84c7816eb9742abab98a2b3f80813d1d13e380631c7a52a8cb80480b8aad87f71
-
SSDEEP
196608:MbmqSQWtDmkfli9yI34dxwwMToZZxaCSBeuS4Ro1MKcOAIuUuSnmOz+8RkyqWCZg:MbmqSQWtykfliEI34swMTUxaCSBeuS4S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cdd32c2993c13f8b5bdab9208a5e7e14df6af57c26700e541918a6b09ec4c27
Files
-
0cdd32c2993c13f8b5bdab9208a5e7e14df6af57c26700e541918a6b09ec4c27.exe windows:5 windows x86 arch:x86
9b2d85cfb981fac8da9a22dd767ac18e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
powrprof
SetSuspendState
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
lstrcmpiW
MulDiv
GetPrivateProfileIntW
OutputDebugStringA
GetModuleFileNameA
GetTempPathA
CreateDirectoryA
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
DeleteFileA
FindFirstFileA
FindNextFileA
CreateFileA
GetDiskFreeSpaceA
GetDriveTypeA
GetFileSize
SetFileAttributesW
SetFilePointer
DeviceIoControl
GetWindowsDirectoryA
GetModuleHandleA
GetShortPathNameA
QueryDosDeviceA
CopyFileA
MoveFileA
MoveFileW
MoveFileExA
MoveFileExW
GetVolumeInformationA
CreateEventA
SetEvent
CreateProcessA
GetSystemDirectoryA
GetVersionExA
GetNativeSystemInfo
GlobalLock
GlobalUnlock
IsDBCSLeadByte
GetSystemTimeAsFileTime
lstrlenA
GetFileAttributesW
QueryPerformanceCounter
WaitForSingleObjectEx
GetStdHandle
WriteFile
FreeConsole
SetConsoleTitleA
AllocConsole
GetDiskFreeSpaceW
RemoveDirectoryW
FileTimeToSystemTime
GetDiskFreeSpaceExA
FindResourceW
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
OutputDebugStringW
VirtualQuery
FindFirstFileExW
GetTimeZoneInformation
SetFilePointerEx
ReadConsoleW
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
HeapSize
GetOEMCP
GetACP
GetModuleHandleW
LoadLibraryW
LoadLibraryA
GetTickCount
GetSystemInfo
HeapFree
CloseHandle
FindClose
SizeofResource
LoadResource
Sleep
GetLastError
GetCurrentThreadId
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
OpenProcess
GetProcAddress
FreeLibrary
LockResource
WaitForSingleObject
CreateDirectoryW
GetTempPathW
GetModuleFileNameW
GetCommandLineW
GlobalMemoryStatus
EncodePointer
DecodePointer
IsValidCodePage
GetModuleHandleExW
ExitProcess
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
SetConsoleMode
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetConsoleMode
LoadLibraryExW
GetFileInformationByHandle
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
HeapReAlloc
ExitThread
CreateThread
SystemTimeToTzSpecificLocalTime
IsProcessorFeaturePresent
IsDebuggerPresent
SetEndOfFile
ReadFile
RtlUnwind
RaiseException
GetStringTypeW
GetCommandLineA
HeapAlloc
LocalFree
FormatMessageA
FormatMessageW
SetConsoleCtrlHandler
GetProcessTimes
SetFileApisToOEM
GetConsoleScreenBufferInfo
AreFileApisANSI
SetProcessAffinityMask
MapViewOfFile
UnmapViewOfFile
OpenEventA
OpenFileMappingA
VirtualAlloc
VirtualFree
FileTimeToDosDateTime
CompareFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FileTimeToLocalFileTime
SetLastError
SetFileTime
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
InitializeCriticalSection
GetLogicalDriveStringsA
GetLogicalDriveStringsW
user32
CharUpperW
MessageBoxW
PostMessageW
ExitWindowsEx
wsprintfW
LoadStringA
FindWindowW
CharUpperA
GetWindowThreadProcessId
CharNextA
SystemParametersInfoA
GetDesktopWindow
GetForegroundWindow
GetSystemMetrics
IsClipboardFormatAvailable
GetClipboardData
CloseClipboard
OpenClipboard
IsWindowVisible
SetWindowPos
PostMessageA
CloseDesktop
EnumDesktopWindows
OpenDesktopA
GetDC
gdi32
CreateFontIndirectW
GetDeviceCaps
advapi32
AllocateAndInitializeSid
GetFileSecurityW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegSetValueA
RegQueryValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyA
LookupPrivilegeValueA
RegQueryInfoKeyA
RegOpenKeyA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
CheckTokenMembership
DuplicateTokenEx
LookupPrivilegeValueW
FreeSid
AdjustTokenPrivileges
OpenProcessToken
SetFileSecurityW
shell32
CommandLineToArgvW
ShellExecuteExW
ShellExecuteA
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteW
SHGetPathFromIDListA
ShellExecuteExA
ole32
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
oleaut32
VariantClear
SysFreeString
SysAllocString
SysStringLen
SysAllocStringLen
VariantCopy
shlwapi
StrCpyNW
StrChrW
PathAppendW
PathRemoveFileSpecW
PathAppendA
StrCpyW
StrCmpW
StrCatW
StrRChrW
PathFileExistsW
PathFileExistsA
netapi32
NetApiBufferFree
NetWkstaGetInfo
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
dbghelp
MiniDumpWriteDump
Sections
.text Size: 572KB - Virtual size: 572KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 462KB - Virtual size: 462KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ