D:\a\wix4\wix4\build\burn\Release\x86\burn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
499eba0173a1c75ee669125b067f5b2c.exe
Resource
win7-20240903-en
General
-
Target
499eba0173a1c75ee669125b067f5b2c.exe
-
Size
4.2MB
-
MD5
499eba0173a1c75ee669125b067f5b2c
-
SHA1
667747f8bb3451f56acc2a618c1f91be806a680f
-
SHA256
ef0fc4d1fd71b53bc88e2a2347195385f1a25b42254de683011fc4388ca796ec
-
SHA512
5b15fa3740a56fdadbbe7af067bb2f5aab86a314dacf080bca4aaef0d86bc42955ef915b603876c5feee4b51c5f01db8e4564144239ad25c6dbe2561656141de
-
SSDEEP
98304:cKaAh0104NS7FGwCh1CTLBMtMeUjafSUYGzSxYcM/Ep:vlaf4XCbCTLBgMeUTYSScQEp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 499eba0173a1c75ee669125b067f5b2c.exe
Files
-
499eba0173a1c75ee669125b067f5b2c.exe.exe windows:6 windows x86 arch:x86
657e40fb09b2c5e277b865a7cf2b8089
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
kernel32
GetUserDefaultUILanguage
GetUserDefaultLangID
GetSystemDefaultLangID
GetStringTypeW
ReadFile
SetFilePointerEx
CreateProcessW
DuplicateHandle
FreeLibrary
ProcessIdToSessionId
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
OpenProcess
GetProcessId
SetProcessShutdownParameters
LocalFileTimeToFileTime
SetEndOfFile
SetFileTime
GetExitCodeThread
DosDateTimeToFileTime
CompareStringA
SetThreadExecutionState
ReleaseSemaphore
CreateMutexW
GetExitCodeProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
RaiseException
GetStdHandle
ExitProcess
GetModuleHandleExW
VerifyVersionInfoW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileSizeEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
DecodePointer
WriteConsoleW
GetComputerNameW
GetSystemTime
VerSetConditionMask
CompareStringW
GetNativeSystemInfo
CreateThread
GetCurrentProcess
CreateSemaphoreW
CreateEventW
ReleaseMutex
ResetEvent
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
MoveFileExW
SetFileAttributesW
RemoveDirectoryW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
GetCurrentDirectoryW
ExpandEnvironmentStringsW
GetProcessHeap
HeapSize
HeapFree
GetDateFormatW
HeapReAlloc
HeapAlloc
GetModuleFileNameW
GetSystemWow64DirectoryW
GetSystemDirectoryW
GetLocalTime
Sleep
SetLastError
GetTempPathW
GetVolumePathNameW
GetTempFileNameW
GetFullPathNameW
CreateDirectoryW
LCMapStringW
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
FormatMessageW
LocalFree
LoadLibraryExW
GetProcAddress
GetModuleHandleW
WaitForMultipleObjects
WaitForSingleObject
HeapSetInformation
GetLastError
lstrlenA
GetCurrentProcessId
GetModuleHandleA
MulDiv
CompareStringOrdinal
GetSystemWindowsDirectoryW
GlobalAlloc
GlobalFree
CopyFileW
LoadResource
LockResource
SizeofResource
FindResourceExA
VirtualAlloc
VirtualFree
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
WriteFile
SetFilePointer
CreateFileA
CloseHandle
CreateFileW
user32
ReleaseDC
MonitorFromPoint
MonitorFromWindow
GetDC
GetMonitorInfoW
ShowWindow
IsDialogMessageW
LoadCursorW
LoadBitmapW
SetWindowLongW
GetWindowLongW
GetCursorPos
MessageBoxW
SetWindowPos
CreateWindowExW
UnregisterClassW
RegisterClassW
PostQuitMessage
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
WaitForInputIdle
IsWindow
PostMessageW
gdi32
SelectObject
StretchBlt
GetObjectW
DeleteObject
DeleteDC
GetDeviceCaps
CreateCompatibleDC
CreateDCW
advapi32
CryptHashData
CryptDestroyHash
CryptReleaseContext
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
GetTokenInformation
AdjustTokenPrivileges
IsWellKnownSid
LookupPrivilegeValueW
CryptCreateHash
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegEnumValueW
RegSetValueExW
CryptGetHashParam
QueryServiceStatus
OpenServiceW
OpenSCManagerW
ControlService
CloseServiceHandle
ChangeServiceConfigW
SetEntriesInAclW
DecryptFileW
InitializeAcl
CreateWellKnownSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
ReportEventW
OpenEventLogW
CloseEventLog
RegQueryInfoKeyW
RegDeleteValueW
RegQueryValueExW
GetUserNameW
InitiateSystemShutdownExW
RegOpenKeyExW
RegCloseKey
QueryServiceConfigW
SetNamedSecurityInfoW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetEntriesInAclA
CryptAcquireContextW
ole32
CoInitializeEx
CoInitialize
CoInitializeSecurity
CoUninitialize
CLSIDFromProgID
CoTaskMemFree
StringFromGUID2
CoCreateInstance
oleaut32
VariantInit
SysAllocString
VariantClear
SysFreeString
rpcrt4
UuidCreate
shell32
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
Sections
.text Size: 432KB - Virtual size: 432KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wixburn Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ