C:\Work\Hotfix_21SJ1388\x64\MUP_Release\MUP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
45d1d2851a4c753a843365c507bda59e52d774187a9c1d67a725afa86ca03006.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
45d1d2851a4c753a843365c507bda59e52d774187a9c1d67a725afa86ca03006.exe
Resource
win10v2004-20240221-en
General
-
Target
45d1d2851a4c753a843365c507bda59e52d774187a9c1d67a725afa86ca03006
-
Size
2.6MB
-
MD5
ccb2888294b699594acccf0b85f6f22e
-
SHA1
72a78928097ea58e996e2ee63f8a8ad3333c84bf
-
SHA256
45d1d2851a4c753a843365c507bda59e52d774187a9c1d67a725afa86ca03006
-
SHA512
64a770c7609ccecf38cf8b37a81b7d0a2afbe7bde267b07bb9a99503a6e44a9c6198b8f203f2803f6ad11a4e51f7b0c51b03319ffe4d44d41c8c2e0933900138
-
SSDEEP
49152:hYUFL4JCoEX2veY69Z+dmR2rRggL3wF+OhTyxz:gYoEG89Z+YR6FLC+t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45d1d2851a4c753a843365c507bda59e52d774187a9c1d67a725afa86ca03006
Files
-
45d1d2851a4c753a843365c507bda59e52d774187a9c1d67a725afa86ca03006.exe windows:6 windows x64 arch:x64
754614ac5639e38f32690195741abf27
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCurrentProcess
FileTimeToLocalFileTime
GetFileAttributesExW
GetFileSizeEx
SystemTimeToTzSpecificLocalTime
GetUserDefaultLCID
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
ReadConsoleW
WriteFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
CreateProcessW
GetExitCodeProcess
GetFileType
EnumSystemLocalesW
IsValidLocale
GetStdHandle
ExitProcess
HeapQueryInformation
GetCommandLineA
RtlUnwindEx
RtlPcToFileHeader
GetCPInfo
LCMapStringW
GetStringTypeW
OutputDebugStringW
SetEndOfFile
GetVolumeInformationW
GetFullPathNameW
FlushFileBuffers
FindFirstFileW
FindClose
FileTimeToSystemTime
DeleteFileW
GlobalFlags
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
CompareStringW
GetCurrentProcessId
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
CreateEventW
WaitForSingleObject
SetEvent
LocalReAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FormatMessageW
GlobalFree
GlobalUnlock
GlobalFindAtomW
GlobalAddAtomW
GetProcAddress
GetSystemDirectoryW
EncodePointer
SetErrorMode
FindResourceW
lstrcmpW
lstrcmpA
GlobalDeleteAtom
GlobalLock
GlobalAlloc
SizeofResource
LockResource
LoadResource
LoadLibraryExW
FreeLibrary
GetVersionExW
GetCurrentThreadId
GetCurrentThread
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
LoadLibraryW
GetModuleHandleExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetLastError
OutputDebugStringA
GetACP
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
HeapFree
GetCommandLineW
GetModuleHandleW
LocalAlloc
LocalFree
MultiByteToWideChar
ReadFile
CloseHandle
GetLastError
DeviceIoControl
SetStdHandle
CreateFileW
WriteConsoleW
user32
CheckMenuItem
SetWindowTextW
IsWindowEnabled
ShowWindow
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetLastActivePopup
GetTopWindow
GetClassNameW
GetClassLongPtrW
SetWindowLongPtrW
GetWindowLongPtrW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
EnableMenuItem
ScreenToClient
MessageBoxW
AdjustWindowRectEx
GetWindowRect
RemovePropW
GetPropW
SetPropW
RedrawWindow
ValidateRect
EndPaint
BeginPaint
GetForegroundWindow
UpdateWindow
GetClientRect
SetRectEmpty
GetMenuItemCount
GetMenuItemID
GetSubMenu
SetMenu
GetMenu
EnableWindow
GetCapture
GetKeyState
GetFocus
GetDlgCtrlID
GetDlgItem
IsIconic
IsWindowVisible
EndDeferWindowPos
SetMenuItemBitmaps
GetWindowThreadProcessId
GetMenuCheckMarkDimensions
SetMenuItemInfoW
LoadBitmapW
GetMessageW
TranslateMessage
GetActiveWindow
GetCursorPos
SetCursor
MapWindowPoints
OffsetRect
GetParent
PostMessageW
PostQuitMessage
SendMessageW
GetScrollPos
GetWindowTextW
GetWindowLongW
GetWindow
RegisterWindowMessageW
DispatchMessageW
PeekMessageW
GetMessagePos
GetMessageTime
DefWindowProcW
CallWindowProcW
RegisterClassW
GetClassInfoW
GetClassInfoExW
CreateWindowExW
IsWindow
IsMenu
DestroyWindow
SetWindowPos
BeginDeferWindowPos
DeferWindowPos
ClientToScreen
RealChildWindowFromPoint
SetTimer
KillTimer
InvalidateRect
DrawTextW
DrawTextExW
GrayStringW
TabbedTextOutW
GetDC
ReleaseDC
GetSystemMetrics
DestroyMenu
GetSysColorBrush
CharUpperW
SetForegroundWindow
LoadCursorW
gdi32
DeleteDC
Escape
GetClipBox
GetStockObject
PtVisible
RectVisible
RestoreDC
SaveDC
SelectObject
SetMapMode
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteObject
CreateBitmap
GetDeviceCaps
SetBkColor
SetTextColor
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteW
shlwapi
PathIsUNCW
PathStripToRootW
PathFindExtensionW
PathFindFileNameW
ole32
CoTaskMemFree
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
VariantInit
VariantClear
VariantChangeType
SysFreeString
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetDevicePropertyW
SetupDiGetDeviceInterfaceDetailW
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 379KB - Virtual size: 378KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gehcont Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ