c:\installer\incremental installer7\dev\AutoRun7\Release\autorun7.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5dcbcb9f5b780bb07e8eb4e98313fc5d0b222823ac94d338b3c3e3fb3efb77e5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5dcbcb9f5b780bb07e8eb4e98313fc5d0b222823ac94d338b3c3e3fb3efb77e5.exe
Resource
win10v2004-20241007-en
General
-
Target
5dcbcb9f5b780bb07e8eb4e98313fc5d0b222823ac94d338b3c3e3fb3efb77e5.exe
-
Size
2.3MB
-
MD5
b1a62f3fd3a9a4a06c6bbffbb1cbb463
-
SHA1
f3954f2ddbbe05daa9eeb3e9a9e0bb661f925e76
-
SHA256
5dcbcb9f5b780bb07e8eb4e98313fc5d0b222823ac94d338b3c3e3fb3efb77e5
-
SHA512
a53c1789f2c465809b307a1daabc0b4c10fafe983040ac112f0de0cf5afae3b532630095e62971e0588a7fd17b62caa4ff2f06cb04e6e3799ceca4ce43569528
-
SSDEEP
24576:pjmc9/6Am6ls/dcaL9dYx0of9R7iYh0iLnS5vyVJ9dHIliC4:pp/hO/d1xdYx0ir7jTGyVJ9dsR4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dcbcb9f5b780bb07e8eb4e98313fc5d0b222823ac94d338b3c3e3fb3efb77e5.exe
Files
-
5dcbcb9f5b780bb07e8eb4e98313fc5d0b222823ac94d338b3c3e3fb3efb77e5.exe.exe windows:4 windows x86 arch:x86
1b45e9b30691181342689639e3f2a9ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualQuery
RtlUnwind
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
SetEnvironmentVariableA
ExitThread
CreateThread
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemInfo
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
FileTimeToSystemTime
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
InterlockedIncrement
WritePrivateProfileStringA
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetFullPathNameA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedDecrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
WaitForSingleObject
ResumeThread
GlobalAddAtomA
MulDiv
lstrcpynA
GetCurrentThreadId
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetThreadLocale
GetLocaleInfoA
GetACP
CreateFileA
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
FileTimeToLocalFileTime
SetErrorMode
CreateDirectoryA
RemoveDirectoryA
CreateProcessA
GetExitCodeProcess
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
LocalAlloc
GetCurrentProcess
GetVersionExA
GetCurrentThread
SetThreadPriority
GetLogicalDrives
GetDriveTypeA
GetShortPathNameA
FormatMessageA
LocalFree
GetDiskFreeSpaceA
SetLastError
GetVolumeInformationA
GetUserDefaultLangID
DeleteFileA
CopyFileA
SetFileAttributesA
GetFileAttributesA
FindFirstFileA
FindNextFileA
FindClose
FindResourceExA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
SetCurrentDirectoryA
GetModuleHandleA
GetCurrentDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeA
InterlockedExchange
user32
GetMenuItemInfoA
InflateRect
GetSysColorBrush
LoadMenuA
DestroyMenu
UnpackDDElParam
ReuseDDElParam
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
GetSysColor
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
UnregisterClassA
CallWindowProcA
OffsetRect
IntersectRect
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
GetLastActivePopup
ShowOwnedPopups
SetCursor
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageA
PostQuitMessage
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
AdjustWindowRectEx
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
SendMessageA
EndDialog
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
ExitWindowsEx
SystemParametersInfoA
DefWindowProcA
LoadImageA
MessageBoxA
LoadCursorA
EnableWindow
CharUpperA
gdi32
TextOutA
RectVisible
PtVisible
BitBlt
DeleteObject
CreateFontIndirectA
GetTextExtentPoint32A
CreateCompatibleBitmap
CreateSolidBrush
GetStockObject
CreateCompatibleDC
CreatePatternBrush
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetPixel
GetDeviceCaps
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ExtTextOutA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyExA
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
AdjustTokenPrivileges
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
VariantInit
VariantChangeType
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 276KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ