H:\rc_v12_i18n_20240103_branch\Build\Release\WPSOffice\office6\addons\konlinesetup_xa\konlinesetup_xa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4e707231dce31b44e8b6b90eeb95344ee6f5811dbe8a4f0c07ea3c8920497926.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4e707231dce31b44e8b6b90eeb95344ee6f5811dbe8a4f0c07ea3c8920497926.exe
Resource
win10v2004-20241007-en
General
-
Target
4e707231dce31b44e8b6b90eeb95344ee6f5811dbe8a4f0c07ea3c8920497926
-
Size
5.3MB
-
MD5
8cfcca51ffc18ecdc1d7b8d83e285473
-
SHA1
51f1e17c177f2f893f2ce9e0c39d1c5871e2eeaf
-
SHA256
4e707231dce31b44e8b6b90eeb95344ee6f5811dbe8a4f0c07ea3c8920497926
-
SHA512
73717c75a28f9ac621fff6d865530a896b8af499aad4398cb12799c3694b1645706fa89fd596f1095be12ebb226370da1751e59e84243577a397a9f33b76b91e
-
SSDEEP
98304:j9Ns5TDi1FXQct/iAj185SHiX3vks8Uu50GPxluKMWRh7mAJf/7s:jgTDi1FXQct/iAj185SCX850ixFRh7XF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e707231dce31b44e8b6b90eeb95344ee6f5811dbe8a4f0c07ea3c8920497926
Files
-
4e707231dce31b44e8b6b90eeb95344ee6f5811dbe8a4f0c07ea3c8920497926.exe windows:5 windows x86 arch:x86
42a30a7fb13cd1b6a4d76ec8a1eea11d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
SetEnvironmentVariableW
SetUnhandledExceptionFilter
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WaitForSingleObject
Sleep
GetTickCount
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryA
VerSetConditionMask
CreateDirectoryW
GetDiskFreeSpaceExW
GetTempFileNameW
GetTempPathW
OutputDebugStringA
CreateMutexW
OpenMutexW
GetExitCodeProcess
CreateProcessW
OpenProcess
GetVersionExW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
VerifyVersionInfoW
MultiByteToWideChar
WideCharToMultiByte
GetGeoInfoW
GetUserGeoID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
GetSystemTime
GetSystemDirectoryW
GetSystemWow64DirectoryW
LoadLibraryW
GetSystemPowerStatus
GetUserDefaultUILanguage
GetSystemDefaultLCID
GetUserDefaultLCID
CreateFileW
GetFileAttributesW
GetFileSizeEx
ReadFile
GetCurrentProcess
TerminateProcess
GetCurrentThreadId
GetProcessId
GetDateFormatW
GetFileInformationByHandle
GetFileSize
SetFilePointer
WriteFile
GetLocalTime
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FileTimeToSystemTime
SystemTimeToFileTime
VirtualAlloc
VirtualFree
DeleteFileW
ExitProcess
FreeResource
lstrcpyW
GetLocaleInfoW
GetUserDefaultLangID
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemDirectoryA
SetLastError
FormatMessageW
MoveFileExA
CompareFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableA
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
SleepEx
GetVersionExA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetACP
GetCurrentDirectoryW
MulDiv
GlobalAlloc
GlobalUnlock
GlobalLock
LocalFree
SetFileTime
DuplicateHandle
DosDateTimeToFileTime
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
CreateFileA
DeviceIoControl
CreateThread
GetPrivateProfileStringW
GetCurrentThread
ProcessIdToSessionId
CreateEventW
GetFileAttributesExW
SetEvent
ResetEvent
ReleaseSemaphore
CreateSemaphoreW
SystemTimeToTzSpecificLocalTime
GetEnvironmentVariableW
ReleaseMutex
OpenFileMappingW
IsDebuggerPresent
OutputDebugStringW
GetStringTypeW
TryEnterCriticalSection
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
GetCPInfo
CompareStringW
LCMapStringW
WaitForSingleObjectEx
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
GetThreadTimes
FreeLibraryAndExitThread
LoadLibraryExW
InterlockedPushEntrySList
RtlUnwind
GetCommandLineA
ExitThread
GetDriveTypeW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetTimeFormatW
IsValidLocale
EnumSystemLocalesW
FlushFileBuffers
GetFullPathNameW
SetStdHandle
SetEndOfFile
GetTimeZoneInformation
SetConsoleCtrlHandler
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
SetConsoleMode
ReadConsoleA
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
FindFirstFileW
FormatMessageA
LockFileEx
UnlockFile
HeapCompact
DeleteFileA
FlushViewOfFile
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapValidate
UnlockFileEx
GetFullPathNameA
LockFile
GetDiskFreeSpaceW
HeapCreate
AreFileApisANSI
Sections
.text Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 785KB - Virtual size: 785KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 671KB - Virtual size: 671KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ