d:\dbs\el\oct\Target\x64\ship\click2run\en-us.pre\Bootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Setup.X64.de-DE_O365HomePremRetail_001a94d5-9257-4d7b-80a6-dce1a0d145d0_TX_DB_.exe
Resource
win11-20241007-de
General
-
Target
Setup.X64.de-DE_O365HomePremRetail_001a94d5-9257-4d7b-80a6-dce1a0d145d0_TX_DB_.exe
-
Size
7.8MB
-
MD5
66233bdb5187266b9188475a9b477450
-
SHA1
028b4ca088e7479ae8a23914cd33a00cb3bdceea
-
SHA256
afaaa4252d10658d90892a8a4d259373f42aaa4405de3db944db39901d2d5d88
-
SHA512
7250fd5185aba57ec045e735e842475a301d65ea30b74c527767c83be03b28e56bcec65800327e8986da5f81a34dcebf2e6472f6467f46dbe91ad3b8397d1f3c
-
SSDEEP
98304:iS/pJO7LH+/9lNmYg0OxpCmUVzNJNwY2hT:iOJO/e/3Nmn0OxpRmJNWT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Setup.X64.de-DE_O365HomePremRetail_001a94d5-9257-4d7b-80a6-dce1a0d145d0_TX_DB_.exe
Files
-
Setup.X64.de-DE_O365HomePremRetail_001a94d5-9257-4d7b-80a6-dce1a0d145d0_TX_DB_.exe.exe windows:5 windows x64 arch:x64
1b52c159a42a9b0be6a17194b513c622
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
gdi32
GetTextExtentPoint32W
Rectangle
SetDCPenColor
CreatePen
GetTextMetricsW
SelectObject
CreateFontW
SetDCBrushColor
GetStockObject
CreateSolidBrush
SetTextColor
SetBkColor
DeleteObject
GetDeviceCaps
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
advapi32
CryptHashData
SetServiceObjectSecurity
ChangeServiceConfigW
ChangeServiceConfig2W
CreateServiceW
DeleteService
EnumDependentServicesW
ControlService
StartServiceW
QueryServiceConfigW
QueryServiceStatusEx
OpenServiceW
CloseServiceHandle
OpenSCManagerW
RegSetKeySecurity
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteValueA
RegCreateKeyExW
RegCloseKey
CryptReleaseContext
CryptAcquireContextW
EventWriteTransfer
EventRegister
EventUnregister
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteTreeW
RegDeleteKeyW
RegGetValueW
RegSetValueExW
RegDeleteValueW
GetTokenInformation
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
RegEnumValueA
RegNotifyChangeKeyValue
RevertToSelf
EventWrite
OpenThreadToken
OpenProcessToken
GetLengthSid
CopySid
InitializeAcl
AddAccessAllowedAce
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
CheckTokenMembership
CreateWellKnownSid
EqualSid
ImpersonateLoggedOnUser
kernel32
HeapSize
GetCurrentProcess
InitializeCriticalSectionEx
GetLastError
CompareStringEx
DeleteCriticalSection
FlsFree
FlsAlloc
IsWow64Process
CloseHandle
CreateThread
GetExitCodeThread
GetCurrentThreadId
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetProcessTimes
GetCurrentThread
GetThreadTimes
CreateDirectoryW
FindFirstFileW
GetFullPathNameW
FindNextFileW
DeviceIoControl
RemoveDirectoryW
SetEndOfFile
FindClose
CreateFileW
GetFileAttributesW
SetFileAttributesW
GetFileAttributesExW
GetDiskFreeSpaceExW
DeleteFileW
GetCurrentDirectoryW
SetFilePointerEx
MoveFileExW
CopyFileW
AreFileApisANSI
WideCharToMultiByte
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
Sleep
GetStringTypeExW
GetUserDefaultLCID
LCMapStringW
FreeLibrary
LocalFree
FormatMessageA
TlsAlloc
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetTickCount64
GetModuleHandleExW
K32GetProcessMemoryInfo
GlobalMemoryStatusEx
LeaveCriticalSection
EnterCriticalSection
RaiseException
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
CreateProcessW
LoadLibraryExW
FindResourceW
SizeofResource
LoadResource
VerSetConditionMask
VerifyVersionInfoW
OpenProcess
GetCurrentProcessId
GetStringTypeW
GetVersionExW
GetUserDefaultLocaleName
IsValidCodePage
SetLastError
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
GetCPInfoExW
SetErrorMode
GetComputerNameW
MulDiv
FormatMessageW
GetNativeSystemInfo
GetSystemDirectoryW
CreateActCtxW
ActivateActCtx
HeapFree
OutputDebugStringA
FindActCtxSectionStringW
DeactivateActCtx
QueryActCtxW
LoadLibraryW
HeapAlloc
GetProcessHeap
CreateEventW
SetEvent
WaitForSingleObject
WaitForMultipleObjectsEx
CreateEventExW
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
CloseThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CreateThreadpoolWait
CreateThreadpoolWork
SubmitThreadpoolWork
ReleaseSemaphore
WaitForSingleObjectEx
QueryDepthSList
TryEnterCriticalSection
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
RtlCaptureStackBackTrace
ReleaseMutex
TzSpecificLocalTimeToSystemTime
GetTempPathW
GetLongPathNameW
ResetEvent
VirtualProtectEx
GetSystemInfo
GlobalFree
GlobalAlloc
ReadFile
WriteFile
GetFileSizeEx
LockResource
GetOverlappedResult
FlushFileBuffers
CancelIoEx
GetDriveTypeW
FindFirstFileExW
GetFileType
GetTempFileNameW
SetFileInformationByHandle
GetFileInformationByHandleEx
SignalObjectAndWait
GetProcessAffinityMask
GetLogicalProcessorInformationEx
CreateWaitableTimerW
SetWaitableTimerEx
CancelWaitableTimer
GetTickCount
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
QueryFullProcessImageNameW
IsProcessorFeaturePresent
CreateIoCompletionPort
PostQueuedCompletionStatus
GetThreadIOPendingFlag
GetQueuedCompletionStatus
IsDebuggerPresent
WaitForMultipleObjects
GetStartupInfoW
CreateMemoryResourceNotification
GetSystemPowerStatus
IsSystemResumeAutomatic
QueryUnbiasedInterruptTime
OutputDebugStringW
RtlCaptureContext
CreateMutexW
GetModuleHandleA
VirtualFree
ExpandEnvironmentStringsW
VirtualAlloc
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
OpenSemaphoreA
CreateSemaphoreA
OpenFileMappingA
LocalAlloc
GetThreadLocale
lstrcmpW
ProcessIdToSessionId
GetCommandLineW
SetEnvironmentVariableW
GetPriorityClass
GetExitCodeProcess
GetProcessId
K32EnumProcesses
GetTimeZoneInformation
IsValidLocale
GetLocaleInfoEx
LCIDToLocaleName
LocaleNameToLCID
GetLocaleInfoW
ResolveLocaleName
GetUserPreferredUILanguages
GetACP
LCMapStringEx
GetSystemDefaultLCID
EnumSystemLocalesEx
GetSystemDefaultLocaleName
GetUserGeoID
GetPhysicallyInstalledSystemMemory
GetProductInfo
SwitchToThread
ReadConsoleW
GetConsoleMode
UnregisterWaitEx
VirtualProtect
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
GetThreadPriority
SetThreadPriority
CreateTimerQueue
InterlockedFlushSList
RtlUnwindEx
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
CompareStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
EncodePointer
RtlPcToFileHeader
DuplicateHandle
OpenThread
K32GetProcessImageFileNameW
GetSystemPreferredUILanguages
GetDateFormatW
GetTimeFormatW
DeleteTimerQueueTimer
CreateTimerQueueTimer
lstrcmpA
FreeConsole
WriteConsoleW
GetStdHandle
AllocConsole
AttachConsole
DecodePointer
ExitProcess
HeapReAlloc
EnumSystemLocalesW
SetStdHandle
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
VirtualQuery
LoadLibraryExA
GetLocalTime
GetConsoleCP
GetLogicalProcessorInformation
RtlUnwind
ole32
IIDFromString
CoTaskMemAlloc
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoSetProxyBlanket
CoCreateFreeThreadedMarshaler
StringFromGUID2
CoCreateGuid
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
CoRegisterInitializeSpy
CoRevokeInitializeSpy
CLSIDFromString
CoEnableCallCancellation
CoDisableCallCancellation
CoCancelCall
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WinVerifyTrust
setupapi
SetupIterateCabinetW
ws2_32
FreeAddrInfoW
WSAStartup
GetAddrInfoW
gdiplus
GdipDrawImageRectRectI
GdipFillRectangleI
GdipCreateFromHDC
GdiplusStartup
GdipDrawImageRectI
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipLoadImageFromStream
GdipCreateBitmapFromScan0
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipCreateSolidFill
GdipDeleteBrush
GdipDeleteGraphics
rpcrt4
UuidToStringW
RpcStringFreeW
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 650KB - Virtual size: 652KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ