G:\se15\src\out\Release\mini_installer.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f0d7467a0ac440b053d8588cf10ebac321a13ad666c714112d3578f1eaed2cd2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0d7467a0ac440b053d8588cf10ebac321a13ad666c714112d3578f1eaed2cd2.exe
Resource
win10v2004-20241007-en
General
-
Target
f0d7467a0ac440b053d8588cf10ebac321a13ad666c714112d3578f1eaed2cd2
-
Size
352KB
-
MD5
baa51153c39b1a65aa823b2b68294352
-
SHA1
1e8414cf99ea376c72f043293e3958e9b8f3576d
-
SHA256
f0d7467a0ac440b053d8588cf10ebac321a13ad666c714112d3578f1eaed2cd2
-
SHA512
380fb84723a0536da89923a73ca8de2c20fbb791661062008376dd69abf8597063ed09ec08873ff7fd13f1fc4ca5c651a0c2f3b688e18e97beaa1b264b93a122
-
SSDEEP
6144:Qq8FgMNJoLnm5p+5786A/dA9izqpzUpEvdu9CiS6J4WoA/ln000OumXJ5XhIkpcS:QqqnNJiy+58Qiz799CiSC/oA5F3XnXhZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0d7467a0ac440b053d8588cf10ebac321a13ad666c714112d3578f1eaed2cd2
Files
-
f0d7467a0ac440b053d8588cf10ebac321a13ad666c714112d3578f1eaed2cd2.exe windows:5 windows x86 arch:x86
d0e8d4bb0cdd443240c3d527cd3d94b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetTokenInformation
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SystemFunction036
shell32
CommandLineToArgvW
kernel32
CloseHandle
CreateDirectoryW
CreateFileW
CreateProcessW
DosDateTimeToFileTime
DuplicateHandle
EnumResourceNamesW
ExitProcess
ExpandEnvironmentStringsW
FindResourceW
FlushFileBuffers
GetCommandLineW
GetCurrentProcess
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesW
GetFileInformationByHandleEx
GetLastError
GetModuleFileNameW
GetProcAddress
GetProcessHeap
GetTempPathW
GetVolumeInformationW
GetVolumePathNameW
HeapAlloc
HeapFree
LoadLibraryExW
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
MultiByteToWideChar
ReadFile
SetFileInformationByHandle
SetFilePointer
SetLastError
SetProcessWorkingSetSize
SizeofResource
Sleep
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrlenW
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135.2MB - Virtual size: 135.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ