c8404495c70d828891f600744e243a83

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2017-May-01 14:33:52
Detected languages English - United States
Debug artifacts C:\build\work\eca3d12b\wix3\build\ship\x86\burn.pdb
CompanyName BlueParrott
FileDescription BlueParrott Updater
FileVersion 103.9.1
InternalName setup
LegalCopyright Copyright (c) BlueParrott. All rights reserved.
OriginalFilename BlueParrott_Updater_V_103.9.1.exe
ProductName BlueParrott Updater
ProductVersion 103.9.1

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Suspicious Strings found in the binary may indicate undesirable behavior: May have dropper capabilities:
  • CurrentVersion\Run
References the BITS service
Info Libraries used to perform cryptographic operations: Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .wixburn
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryW
  • LoadLibraryExW
  • LoadLibraryExA
Can access the registry:
  • RegCloseKey
  • RegOpenKeyExW
  • RegQueryValueExW
  • RegDeleteValueW
  • RegSetValueExW
  • RegQueryInfoKeyW
  • RegEnumValueW
  • RegEnumKeyExW
  • RegDeleteKeyW
  • RegCreateKeyExW
Possibly launches other programs:
  • CreateProcessW
Uses Microsoft's cryptographic API:
  • CryptDestroyHash
  • CryptHashData
  • CryptCreateHash
  • CryptGetHashParam
  • CryptReleaseContext
  • CryptAcquireContextW
Can create temporary files:
  • CreateFileW
  • GetTempPathW
  • CreateFileA
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
  • CheckTokenMembership
Interacts with services:
  • ChangeServiceConfigW
  • ControlService
  • OpenSCManagerW
  • OpenServiceW
  • QueryServiceStatus
  • QueryServiceConfigW
Manipulates other processes:
  • OpenProcess
Changes object ACLs:
  • SetNamedSecurityInfoW
Can shut the system down or lock the screen:
  • InitiateSystemShutdownExW
Malicious The file contains overlay data. 24225727 bytes of data starting at offset 0x78a00.
The file contains a CAB Installer file after the PE data.
Overlay data amounts for 98.0013% of the executable.
Suspicious VirusTotal score: 1/65 (Scanned on 2018-04-18 07:09:49) Cylance: Unsafe

Hashes

MD5 c8404495c70d828891f600744e243a83
SHA1 6bc346de44930c6f91b3e7c72f9047861a34aa16
SHA256 316817d760c93aa06ef55a2611a931d945e083c8959436a5a97daa80d73e0143
SHA3 9d2614f91370b778e0d67f8f58cb4086c82814fe200193d326cb761e8136fe72
SSDeep 393216:5he2hPp2NXyMFRe9VPzsijpz9BoS41hEaqiqLdIUtLVFEzNWQLMVYFa+sN:5heyPpMTqewfoEZiqLSgFOWQlFaj
Imports Hash b87a2a6b52aa6910be7b586401633383

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x118

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 7
TimeDateStamp 2017-May-01 14:33:52
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP

Image Optional Header

Magic PE32
LinkerVersion 14.0
SizeOfCode 0x49c00
SizeOfInitializedData 0x2ea00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0002E1FD (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x4b000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.1
ImageVersion 0.0
SubsystemVersion 5.1
Win32VersionValue 0
SizeOfImage 0x7d000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 a67b51c27aac0c4dfc083827d24d4658
SHA1 72882483b502a3c529c98d04888b6c7715498459
SHA256 068af32ed901e014be357397efa03fa538d2ecd4de3b6cdd4dff41cda8272094
SHA3 252223162fb63a27c2f360839cfc4d75a044a9316f487b9bb926c80b735ec1fd
VirtualSize 0x49a67
VirtualAddress 0x1000
SizeOfRawData 0x49c00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.56282

.rdata

MD5 119b8fb4aff26bdb2b70951b3ce2b221
SHA1 d0a15bd67600203356e61e0f2c387392df91e31a
SHA256 3d010bacfae2ead5aebcc49413155ce72fef4b577f0ba07431ba91b5abd76bfa
SHA3 b1a320bddafbe4bbd46f8baf4556fdd23e59051290ac99705162cd9ef162cbab
VirtualSize 0x1ec60
VirtualAddress 0x4b000
SizeOfRawData 0x1ee00
PointerToRawData 0x4a000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.10841

.data

MD5 7dfb613b52fd85bf38fe5b511a5c8a45
SHA1 bdac2068456e6b1fed27d100bc0fd5fbf1c7f3d9
SHA256 991db5045b6b2f4b5a7e0611e58cad5008174f0da586bfbabae9336fd2c84f02
SHA3 e08d49154d1d7af1f64e0472d3976007ea2b24d0e2b3064d69edb0b653bbda91
VirtualSize 0x1730
VirtualAddress 0x6a000
SizeOfRawData 0xa00
PointerToRawData 0x68e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.15458

.wixburn

MD5 900d826268f353f429d9c85b8e19912b
SHA1 9417825040fe529ba33538379529c6a820f7247f
SHA256 1f14088ec9bd44003300184dfc440169588579dc82215208900ba655ca121c9e
SHA3 a79eb1fb19e7378eed998d271f07aa108378594b31ff0cea3e05cb0c5f08ff3d
VirtualSize 0x38
VirtualAddress 0x6c000
SizeOfRawData 0x200
PointerToRawData 0x69800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.589819

.tls

MD5 bf619eac0cdf3f68d496ea9344137e8b
SHA1 5c3eb80066420002bc3dcc7ca4ab6efad7ed4ae5
SHA256 076a27c79e5ace2a3d47f9dd2e83e4ff6ea8872b3c2218f66c92b89b55f36560
SHA3 622de1e1568ddef36c4b89b706b05201c13481c3575d0fc804ff8224787fcb59
VirtualSize 0x9
VirtualAddress 0x6d000
SizeOfRawData 0x200
PointerToRawData 0x69a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0

.rsrc

MD5 5f4b2db5e02050f2ff177bd2ef3f70b8
SHA1 6313474c125276acf87546880fcb40cf4d60b840
SHA256 239fb84e6de8f0a78f3bfa194e8ac145d2a8b1f47ad7584210ffb8b86165f482
SHA3 cf41ae43d2114138bb75012ed0505d1e9f825a230dfa3ebc0529d3aa0a24f23e
VirtualSize 0xaf68
VirtualAddress 0x6e000
SizeOfRawData 0xb000
PointerToRawData 0x69c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.74971

.reloc

MD5 64b4055db26d6e5c21cfca5abb774e9e
SHA1 339f75ab37c28b6fecc0d020a8f52bf90d9e0fd3
SHA256 d387a02ef137f40ec4da01878deeb2e9f3575beea5dd3b4ab8dd6b56d870dca1
SHA3 a600d3aad1425ec28e58173f9e3c791820ec52574898290366cd7e6bbfcc5439
VirtualSize 0x3dec
VirtualAddress 0x79000
SizeOfRawData 0x3e00
PointerToRawData 0x74c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.79026

Imports

ADVAPI32.dll RegCloseKey
RegOpenKeyExW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
InitiateSystemShutdownExW
GetUserNameW
RegQueryValueExW
RegDeleteValueW
CloseEventLog
OpenEventLogW
ReportEventW
ConvertStringSecurityDescriptorToSecurityDescriptorW
DecryptFileW
CreateWellKnownSid
InitializeAcl
SetEntriesInAclW
ChangeServiceConfigW
CloseServiceHandle
ControlService
OpenSCManagerW
OpenServiceW
QueryServiceStatus
SetNamedSecurityInfoW
CheckTokenMembership
AllocateAndInitializeSid
SetEntriesInAclA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
GetTokenInformation
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
QueryServiceConfigW
USER32.dll GetMessageW
PostMessageW
IsWindow
WaitForInputIdle
PostQuitMessage
PeekMessageW
MsgWaitForMultipleObjects
PostThreadMessageW
GetMonitorInfoW
MonitorFromPoint
IsDialogMessageW
LoadCursorW
LoadBitmapW
SetWindowLongW
GetWindowLongW
GetCursorPos
MessageBoxW
CreateWindowExW
UnregisterClassW
RegisterClassW
DefWindowProcW
DispatchMessageW
TranslateMessage
OLEAUT32.dll #6
#2
#8
#9
GDI32.dll CreateCompatibleDC
DeleteObject
SelectObject
StretchBlt
GetObjectW
DeleteDC
SHELL32.dll SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
ole32.dll CoUninitialize
CoInitializeEx
CoInitialize
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoInitializeSecurity
CLSIDFromProgID
KERNEL32.dll GetCommandLineA
GetCPInfo
GetOEMCP
CloseHandle
CreateFileW
GetProcAddress
LocalFree
HeapSetInformation
GetLastError
GetModuleHandleW
FormatMessageW
lstrlenA
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
Sleep
GetLocalTime
GetModuleFileNameW
ExpandEnvironmentStringsW
GetTempPathW
GetTempFileNameW
CreateDirectoryW
GetFullPathNameW
CompareStringW
GetCurrentProcessId
WriteFile
SetFilePointer
LoadLibraryW
GetSystemDirectoryW
CreateFileA
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
FindClose
GetCommandLineW
GetCurrentDirectoryW
RemoveDirectoryW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
MoveFileExW
GetCurrentProcess
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
ReleaseMutex
TlsAlloc
GetEnvironmentStringsW
TlsSetValue
TlsFree
CreateProcessW
GetVersionExW
VerSetConditionMask
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
GetSystemTime
GetNativeSystemInfo
GetModuleHandleExW
GetWindowsDirectoryW
GetSystemWow64DirectoryW
GetComputerNameW
VerifyVersionInfoW
GetVolumePathNameW
GetDateFormatW
GetUserDefaultUILanguage
GetSystemDefaultLangID
GetUserDefaultLangID
GetStringTypeW
ReadFile
SetFilePointerEx
DuplicateHandle
InterlockedExchange
InterlockedCompareExchange
LoadLibraryExW
CreateEventW
ProcessIdToSessionId
OpenProcess
GetProcessId
WaitForSingleObject
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
CreateThread
GetExitCodeThread
SetEvent
WaitForMultipleObjects
InterlockedIncrement
InterlockedDecrement
ResetEvent
SetEndOfFile
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CompareStringA
GetExitCodeProcess
SetThreadExecutionState
CopyFileExW
MapViewOfFile
UnmapViewOfFile
CreateMutexW
CreateFileMappingW
GetThreadLocale
IsValidCodePage
FreeEnvironmentStringsW
TlsGetValue
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DecodePointer
WriteConsoleW
GetModuleHandleA
GlobalAlloc
GlobalFree
GetFileSizeEx
CopyFileW
VirtualAlloc
VirtualFree
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
SystemTimeToFileTime
GetSystemInfo
VirtualProtect
VirtualQuery
SetCurrentDirectoryW
FindFirstFileExW
GetFileType
GetACP
ExitProcess
GetStdHandle
InitializeCriticalSectionAndSpinCount
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
LoadLibraryExA
RPCRT4.dll UuidCreate
Cabinet.dll (delay-loaded) #22
#23
#20

Delayed Imports

Attributes 0x1
Name Cabinet.dll
ModuleHandle 0x6b5c4
DelayImportAddressTable 0x6a944
DelayImportNameTable 0x68240
BoundDelayImportTable 0x684ec
UnloadDelayImportTable 0
TimeStamp 1970-Jan-01 00:00:00

1

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.85493
MD5 e39ce71272bfb1e825fbc3ca061e5999
SHA1 5b6a9dc3982831f9dc7fb4c8b05fba84c884e6d0
SHA256 03743092c8b0d7f5cab8e17b2a89cde5708c311f36e001fc030af633e4c2a7d6
SHA3 a81777cc117db7f9901484bd44a7db49d0c1ccb59699427856199475b4a3e8cc

2

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.20823
MD5 20781fdc39f51325a9519daf5a276ebb
SHA1 4dee80c26281b7ff93154ac2b9fc81d9c80c27e8
SHA256 4465af872416941b9eb2c4126a1f88ea297c95c3306b53da0498381c4f0cc6d7
SHA3 a170f4ac5a6575c1324883f149e1b3964649bd481b17f7cb64cce7517f8e3980

3

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.69868
MD5 09a389daa12105959aa9fb333f7f5b4c
SHA1 b4f8238b561a3ec1a3f77f70c0d08429876c17b4
SHA256 25bcfeb215230c275e0dae6e987b826c7f7d41751197f28a2f3e00ba205df468
SHA3 b20de732cb76776ed1449d79d5d29c7260d9b03546b80bd13e7cb334ddb2bfd0

4

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.15342
MD5 ff4a678a3349f3011f320423aea1ff4c
SHA1 5e9a993c95941bd48b6cb88ba2c5f280361d370e
SHA256 8c3aac0caa4b64b76fed60f099c92c091c669f6088c7aa1d70e2dbed9786f419
SHA3 44993380ac20786ab6c11b594b932e319285cd65d5205f181b5f794879369a0e

1 (#2)

Type RT_MESSAGETABLE
Language English - United States
Codepage Latin 1 / Western European
Size 0x2840
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.06919
MD5 a99c9f2aba6eb725972156b7a4943e46
SHA1 9bfca5062deb9d067f118019fe748d110962a8d7
SHA256 e580ff987740c1e27979aaaa14ba001b06c86929cc321945cf1bdb614d257255
SHA3 4266b8855f8b84c8583e3f5c0ffccc59eece1761a21cfeff04601c9bfa9e6db4

1 (#3)

Type RT_GROUP_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x3e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.62308
Detected Filetype Icon file
MD5 7266d550f7fc2a4f9527ac534831ee65
SHA1 2655a17d14813113c955d1059f4679dcc405c070
SHA256 822952416183dc59088127325e52faebc96d08a97d76bd9202cc4880de84f48e
SHA3 0fdf51b4f52294affe8ece587a1ff20f47fe201efed87ab32ecd585ef0b98df0

1 (#4)

Type RT_VERSION
Language English - United States
Codepage Latin 1 / Western European
Size 0x32c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33215
MD5 da423c4df2be105bcb1a48a85535f3dc
SHA1 63741dd890df4082fe4ec249758d367d2727c93f
SHA256 bde75fe50c721ebcdcd7f1fa0e98b016bd7cbd4b1dfb7446c951083e51957beb
SHA3 e89f556a6b12f2bab02d2529091422611fa476cf8b1db982292757f8526d6894

1 (#5)

Type RT_MANIFEST
Language English - United States
Codepage Latin 1 / Western European
Size 0x4d2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.30829
MD5 8ff25bb3faceb412f946beb4d4b70aba
SHA1 e77a0a3c8dcda8fca1bf8032ced5c633bd13695b
SHA256 409b7a72f95793e29fe6b03ef2c28effbc5b80ffe57fb7a974439022cc7a0e75
SHA3 3fe08b5bceae3a00c5e5c93835e5efd035482c03a6c9aae3749b8dba22bacd0b

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 103.9.1.0
ProductVersion 103.9.1.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName BlueParrott
FileDescription BlueParrott Updater
FileVersion (#2) 103.9.1
InternalName setup
LegalCopyright Copyright (c) BlueParrott. All rights reserved.
OriginalFilename BlueParrott_Updater_V_103.9.1.exe
ProductName BlueParrott Updater
ProductVersion (#2) 103.9.1
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2017-May-01 14:33:52
Version 0.0
SizeofData 76
AddressOfRawData 0x678ec
PointerToRawData 0x668ec
Referenced File C:\build\work\eca3d12b\wix3\build\ship\x86\burn.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2017-May-01 14:33:52
Version 0.0
SizeofData 20
AddressOfRawData 0x67938
PointerToRawData 0x66938

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2017-May-01 14:33:52
Version 0.0
SizeofData 984
AddressOfRawData 0x6794c
PointerToRawData 0x6694c

TLS Callbacks

StartAddressOfRawData 0x46d000
EndAddressOfRawData 0x46d008
AddressOfIndex 0x46aac0
AddressOfCallbacks 0x44b43c
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x68
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x46a008
SEHandlerTable 0x4678e0
SEHandlerCount 3

RICH Header

XOR Key 0xdc0f4ed9
Unmarked objects 0
241 (40116) 9
243 (40116) 124
242 (40116) 24
ASM objects (24723) 19
C objects (24723) 19
C++ objects (24723) 38
C objects (VS2008 SP1 build 30729) 5
Imports (VS2008 SP1 build 30729) 17
Total imports 341
C++ objects (VS2017 v15.0 compiler 25017) 75
Resource objects (VS2017 v15.0 compiler 25017) 1
151 2
Linker (VS2017 v15.0 compiler 25017) 1

Errors

<-- -->