Static task
static1
Behavioral task
behavioral1
Sample
uwpFixer.exe
Resource
win10v2004-20230703-en
General
-
Target
uwpFixer.exe
-
Size
230KB
-
MD5
07a8cdecf8ab48ecb4a58eed35a91256
-
SHA1
4a3167889e7d4e949c8a950a24e4101bae8c80e8
-
SHA256
385d9ea729c6c85731218cf3c3570bfe482b222a25300d1a669fa36452bb8a90
-
SHA512
695178006dbcb70dc785823a68a30c359741cb37344ab9a9f77ba615398a90d956351df9f661055f9ee4503e4c142def68532de9a1da05db08c326926c129ff4
-
SSDEEP
3072:Ho1kNcEp+bx3+I8wZ6zhVSzuVkrPGk/Z+z9Aja4SHpx2zFgXZta:Ho1kGY+bx3hqUBGTkSHa2XZ0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource uwpFixer.exe
Files
-
uwpFixer.exe.exe windows x64
4ddb7d58811694556dedad0d22f3d0bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
gdi32
GetDeviceCaps
kernel32
CreateToolhelp32Snapshot
Process32FirstW
CloseHandle
Process32NextW
OpenProcess
TerminateProcess
GetModuleHandleA
ReleaseSRWLockExclusive
ReleaseMutex
ReleaseSRWLockShared
GetLastError
AddVectoredExceptionHandler
SetThreadStackGuarantee
Sleep
AcquireSRWLockExclusive
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
GetProcAddress
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
GetStdHandle
GetCurrentProcessId
WaitForSingleObject
TryAcquireSRWLockExclusive
QueryPerformanceCounter
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetConsoleMode
GetModuleHandleW
FormatMessageW
MultiByteToWideChar
WriteConsoleW
CreateThread
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
InitializeSListHead
GetCurrentThreadId
IsProcessorFeaturePresent
shell32
Shell_NotifyIconA
user32
GetCursorPos
SetCursorPos
DefWindowProcA
PostQuitMessage
SetForegroundWindow
CreatePopupMenu
InsertMenuA
TrackPopupMenu
DestroyMenu
CallNextHookEx
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
ClipCursor
MessageBoxA
ClientToScreen
GetForegroundWindow
GetWindowTextA
GetDC
ReleaseDC
GetClientRect
ntdll
RtlNtStatusToDosError
NtWriteFile
vcruntime140
__C_specific_handler
__current_exception
__current_exception_context
memmove
memcmp
memcpy
memset
__CxxFrameHandler3
_CxxThrowException
api-ms-win-crt-string-l1-1-0
strlen
_wcsicmp
api-ms-win-crt-runtime-l1-1-0
_initterm
_initterm_e
_get_initial_narrow_environment
_exit
_initialize_narrow_environment
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
_set_app_type
exit
_seh_filter_exe
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ