msiexec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
82e39d67faf2ee6075aeaace9e0cb3509e98a684d88b695f271fe842331a7390.exe
Resource
win10v2004-20250217-en
General
-
Target
82e39d67faf2ee6075aeaace9e0cb3509e98a684d88b695f271fe842331a7390
-
Size
110KB
-
MD5
347e912cd609700a5f584ab639e2db09
-
SHA1
c728a02cfb3f64e53020988024c3f05eb00a12c8
-
SHA256
82e39d67faf2ee6075aeaace9e0cb3509e98a684d88b695f271fe842331a7390
-
SHA512
be3d1745c68b8326bedd3cc8fc659b784e87904f8fc53f2d4893efdad8cdd236fbe9e3a0229970ca2aa2764d2c2e327a5fcc742ed432d5172f67a5065dda0127
-
SSDEEP
3072:3jAvIU39EfTx4rVKr5THHi+GrOR0mS4ayjnMwK:3jIIs9xiZHHi+2R4//K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82e39d67faf2ee6075aeaace9e0cb3509e98a684d88b695f271fe842331a7390
Files
-
82e39d67faf2ee6075aeaace9e0cb3509e98a684d88b695f271fe842331a7390.exe windows:10 windows x64 arch:x64
e097c2eba2804cfabad295256c8b4a6f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
OpenProcessToken
OpenThreadToken
StartServiceCtrlDispatcherW
SetThreadToken
SetSecurityDescriptorGroup
GetTokenInformation
RegEnumKeyW
EqualSid
RegQueryValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupPrivilegeValueW
GetAce
GetSecurityDescriptorLength
MakeAbsoluteSD
InitializeAcl
AllocateAndInitializeSid
SetServiceStatus
SetSecurityDescriptorOwner
AddAccessAllowedAce
RevertToSelf
FreeSid
RegOpenKeyExW
MakeSelfRelativeSD
RegisterServiceCtrlHandlerW
GetLengthSid
AdjustTokenPrivileges
RegCloseKey
kernel32
GetSystemDefaultLangID
ExitProcess
GetCommandLineW
GetEnvironmentVariableW
FreeLibrary
LoadLibraryExW
GetCurrentProcess
GetModuleHandleExW
WaitForSingleObject
SetEvent
OutputDebugStringW
GetModuleHandleW
GetCurrentThread
WriteFile
InitializeCriticalSection
OpenProcess
GlobalAlloc
WideCharToMultiByte
LoadLibraryW
GetLocaleInfoW
Sleep
FormatMessageW
GetVersionExW
LeaveCriticalSection
GetModuleFileNameW
CompareStringW
GetACP
lstrcmpW
MultiByteToWideChar
lstrlenW
GetStdHandle
GetLastError
SetLastError
GetProcAddress
EnterCriticalSection
GlobalFree
UnhandledExceptionFilter
GetFileType
CreateEventW
SetCurrentDirectoryW
OpenEventW
DeleteCriticalSection
CloseHandle
GetVersion
CreateThread
GetSystemDirectoryW
LoadLibraryExA
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
DelayLoadFailureHook
SetUnhandledExceptionFilter
GetStartupInfoW
user32
PostQuitMessage
MsgWaitForMultipleObjects
TranslateMessage
IsCharAlphaNumericW
PeekMessageW
PostThreadMessageW
DispatchMessageW
GetMessageW
msvcrt
_XcptFilter
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
_ismbblead
__setusermatherr
_initterm
__C_specific_handler
_acmdln
_fmode
_commode
_lock
_unlock
__dllonexit
_onexit
memcpy
memset
?terminate@@YAXXZ
_vsnprintf
_wcsicmp
_vsnwprintf
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
ole32
CoInitialize
StgOpenStorage
CoRevokeClassObject
CoRegisterClassObject
CoUninitialize
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ