UserAccountControlSettings.pdb
Static task
static1
Behavioral task
behavioral1
Sample
UserAccountControlSettings.exe
Resource
win7-20231215-en
General
-
Target
UserAccountControlSettings.exe
-
Size
89KB
-
MD5
400248f7086a81c10260ee1d1ba7c8b6
-
SHA1
9e13aa029eabafc9229ece409240db56672e3c94
-
SHA256
0e4446a30b9270c23344d509d2da82ecd64d7d52341d859f1dc3848d7f6ff1a9
-
SHA512
73c96f2f42c5a2de93f7f1accc9e2482945f9c1fdfee8c34cfac5a761088102cf8fd3c23ee8d8ca73456d1eea1ae71eacb95771e74c9f1a85e349565244012fc
-
SSDEEP
1536:axOWZooTp0nHzs9E4hVc2ay+XwH751sNz0UCdkV/L7p:Mpks9Fhe2nnb5K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource UserAccountControlSettings.exe
Files
-
UserAccountControlSettings.exe.exe windows:10 windows x86 arch:x86
3d3da7592ca6678da141b25d2786f1ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetTokenInformation
DuplicateToken
CheckTokenMembership
OpenProcessToken
CreateWellKnownSid
kernel32
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
GetCommandLineW
GetCurrentProcess
ReleaseSemaphore
GetModuleHandleExW
CompareStringOrdinal
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
FormatMessageW
GetLastError
GetModuleFileNameA
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
ReleaseSRWLockShared
CreateThreadpoolTimer
LoadLibraryW
HeapAlloc
GetProcAddress
CreateMutexExW
LocalFree
AcquireSRWLockShared
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
FreeLibrary
DebugBreak
IsDebuggerPresent
DelayLoadFailureHook
ReleaseSRWLockExclusive
ResolveDelayLoadedAPI
user32
LoadStringW
SetWindowPos
GetCursorPos
GetMonitorInfoW
SetForegroundWindow
DestroyWindow
MonitorFromPoint
msvcrt
_XcptFilter
_cexit
__p__commode
exit
_amsg_exit
memcmp
__p__fmode
_except_handler4_common
_controlfp
?terminate@@YAXXZ
_onexit
__dllonexit
_unlock
_lock
_wcmdln
_initterm
__setusermatherr
_exit
memmove_s
_purecall
??3@YAXPAX@Z
memcpy_s
_vsnwprintf
__set_app_type
__wgetmainargs
memset
shlwapi
ord278
ord240
api-ms-win-core-com-l1-1-0
CoInitializeEx
CoUninitialize
StringFromGUID2
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetStartupInfoW
TerminateProcess
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
UnhandledExceptionFilter
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
ntdll
NtQueryInformationToken
ole32
CoGetObject
CoAllowSetForegroundWindow
shell32
CommandLineToArgvW
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ