D:\2.9.3.2\rel\Uninstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5dbd448bee9e15aa69d49632df9cc7c8101dde9251ffe6415fb688fc35772ebc.exe
Resource
win7-20240903-en
General
-
Target
5dbd448bee9e15aa69d49632df9cc7c8101dde9251ffe6415fb688fc35772ebc
-
Size
1.6MB
-
MD5
2b331806fcbd1b53fbe3c1806dea2727
-
SHA1
6d4dd5d66d74a1be03ea3fca77ff5202dd7013f5
-
SHA256
5dbd448bee9e15aa69d49632df9cc7c8101dde9251ffe6415fb688fc35772ebc
-
SHA512
88d8fd52829caf7e425f61e95f34359c18073840d7d8cab9f588c11c0dbed015b6baa843209763b5a1955ad0781557b3c8655617ece1fba04e4699ac40aa0bf0
-
SSDEEP
24576:V1ptDiqXtwc3MiSuA9FpacpViJHh5ZoCGxBmg/8B:V1w5oA9vacY5ZoCAv8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dbd448bee9e15aa69d49632df9cc7c8101dde9251ffe6415fb688fc35772ebc
Files
-
5dbd448bee9e15aa69d49632df9cc7c8101dde9251ffe6415fb688fc35772ebc.exe windows:5 windows x86 arch:x86
10d8c5ae41c451551bc3119de68771c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetFilePointer
GetSystemInfo
GetFileAttributesExW
InitializeCriticalSection
GetNativeSystemInfo
ResetEvent
SetEvent
PostQueuedCompletionStatus
GetExitCodeThread
TerminateThread
CreateEventW
CreateIoCompletionPort
InterlockedExchange
GetQueuedCompletionStatus
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
SetStdHandle
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
ExitThread
FindFirstFileExW
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
CreateThread
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
ReadFile
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
QueryPerformanceCounter
GetStringTypeW
TryEnterCriticalSection
WaitForSingleObjectEx
DuplicateHandle
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
SetEndOfFile
GetVersionExW
lstrlenA
MoveFileExW
SetFileAttributesW
SetThreadLocale
GetThreadLocale
lstrcmpA
lstrlenW
FlushFileBuffers
GetFileSize
LocalFree
DeviceIoControl
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
TerminateProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetShortPathNameW
GetCurrentThread
SetThreadPriority
GetCurrentProcess
SetPriorityClass
GetEnvironmentVariableW
DeleteFileW
CloseHandle
WriteFile
CreateFileW
GetTempPathW
GetTickCount
HeapDestroy
LoadLibraryW
GetCurrentProcessId
OpenProcess
GetModuleHandleA
MulDiv
GetVersion
OutputDebugStringW
FreeResource
GlobalFree
GlobalAlloc
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
MultiByteToWideChar
lstrcmpiW
GetProcAddress
FreeLibrary
DecodePointer
SetLastError
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
Sleep
WritePrivateProfileStringW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
DeleteCriticalSection
GetModuleHandleW
GetProcessHeap
HeapAlloc
HeapFree
GetPrivateProfileStringW
GetStartupInfoW
CreatePipe
WaitForSingleObject
LCMapStringW
CreateProcessW
HeapReAlloc
HeapSize
ExitProcess
user32
GetWindow
PostQuitMessage
IsWindow
ShowWindow
DestroyWindow
GetDlgItem
UnregisterClassW
SetWindowLongW
DefWindowProcW
CallWindowProcW
PostMessageW
SetTimer
KillTimer
RegisterClassExW
GetClassInfoExW
GetWindowLongW
CreateWindowExW
CharNextW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
MessageBoxW
SystemParametersInfoW
BeginPaint
CopyRect
EndPaint
IsIconic
EqualRect
InvalidateRect
PtInRect
TrackMouseEvent
GetCursorPos
SetFocus
SetCapture
ReleaseCapture
ClientToScreen
SetWindowRgn
MoveWindow
EnableWindow
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
GetForegroundWindow
GetWindowTextW
SetForegroundWindow
IsWindowVisible
IsZoomed
MonitorFromRect
OffsetRect
SetLayeredWindowAttributes
LoadImageW
SetRectEmpty
IsRectEmpty
GetIconInfo
DrawIconEx
SetCursor
LoadIconW
ScreenToClient
GetDoubleClickTime
IntersectRect
FillRect
SetWindowPos
SendMessageW
LoadCursorW
DrawTextW
GetDC
ReleaseDC
UpdateLayeredWindow
wsprintfW
gdi32
SetTextCharacterExtra
GetCurrentObject
GetTextColor
CreateFontIndirectW
RestoreDC
Rectangle
GetStockObject
CreatePen
SaveDC
CreateRectRgnIndirect
ExtSelectClipRgn
SetTextColor
SetBkMode
CreateSolidBrush
SetBitmapBits
GetBitmapBits
StretchBlt
SetStretchBltMode
SetPixel
GetObjectW
CreateDIBSection
CreateRectRgn
CombineRgn
CreateRoundRectRgn
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleDC
advapi32
RegCloseKey
RegQueryInfoKeyW
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
DeleteService
CloseServiceHandle
ControlService
QueryServiceStatus
OpenServiceW
OpenSCManagerW
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
LookupAccountNameW
GetUserNameW
RegEnumKeyW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderPathW
SHChangeNotify
ShellExecuteExW
ShellExecuteW
SHGetSpecialFolderLocation
SHCreateDirectoryExW
ord165
SHGetMalloc
ole32
OleRun
CoInitializeSecurity
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
GetErrorInfo
SysFreeString
VarUI4FromStr
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocString
VarBstrCmp
VariantInit
VariantCopy
VariantClear
shlwapi
PathIsDirectoryW
SHDeleteValueW
SHSetValueW
SHDeleteKeyW
SHGetValueW
PathSearchAndQualifyW
PathRemoveBackslashW
StrCmpIW
PathFindFileNameW
PathCombineW
PathAppendW
PathRemoveFileSpecW
PathFileExistsW
comctl32
ord17
InitCommonControlsEx
msimg32
AlphaBlend
gdiplus
GdipDisposeImage
GdipAlloc
GdipFree
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdiplusStartup
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawString
GdipSetTextRenderingHint
GdipCreateFromHDC
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
wininet
HttpOpenRequestW
HttpSendRequestW
InternetSetOptionW
InternetOpenW
InternetCrackUrlW
HttpQueryInfoW
InternetCloseHandle
InternetReadFile
InternetConnectW
crypt32
CryptStringToBinaryW
CryptBinaryToStringW
psapi
GetModuleFileNameExW
netapi32
Netbios
iphlpapi
GetIpAddrTable
GetAdaptersInfo
secur32
GetUserNameExW
Sections
.text Size: 696KB - Virtual size: 696KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 609KB - Virtual size: 609KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE