c:\jenkins\workspace\Client\Client\Windows\release\bin\X64\release\ZoomUpdater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f886dbb9d1e22967ba43d5113903dc256f46ed84367c9a304642888e8f6b1263.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f886dbb9d1e22967ba43d5113903dc256f46ed84367c9a304642888e8f6b1263.exe
Resource
win10v2004-20240226-en
General
-
Target
f886dbb9d1e22967ba43d5113903dc256f46ed84367c9a304642888e8f6b1263
-
Size
719KB
-
MD5
b5950845b51d6b5b51bab3c0c328ef16
-
SHA1
b663615c21d97e3a0467fa47da946de2d02e1803
-
SHA256
f886dbb9d1e22967ba43d5113903dc256f46ed84367c9a304642888e8f6b1263
-
SHA512
ded66e416dfb33d88bb19f4aa66ccb8efe98d41df97376d3cb5f5e6c1fd1486546c5af6ff4f9912897654337abc7cabf55390ab9c27b6acc4749566a70d62096
-
SSDEEP
12288:ivOTUALPfUBL8252uui8FbECP7BhdfswdJ0NXdU8ZWH7DEP1rCJ7U3P:im7Lt2rR8FfBhRJUEbDk1ulUf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f886dbb9d1e22967ba43d5113903dc256f46ed84367c9a304642888e8f6b1263
Files
-
f886dbb9d1e22967ba43d5113903dc256f46ed84367c9a304642888e8f6b1263.exe windows:6 windows x64 arch:x64
4ea69bba0beedccf32616dc9c738ad77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shlwapi
PathAppendW
PathFileExistsW
PathRemoveBackslashW
PathRemoveFileSpecW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WTHelperGetProvCertFromChain
crypt32
CertGetNameStringW
kernel32
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
HeapFree
CreateFileW
CloseHandle
HeapAlloc
GetProcAddress
GetProcessHeap
CreateDirectoryW
ReadFile
FindFirstFileW
SetLastError
GetCommandLineW
FindNextFileW
GetCurrentProcess
WriteFile
GetConsoleCP
GetModuleFileNameW
SetFilePointer
SetEndOfFile
GetTempPathW
FindClose
GetFileAttributesW
GetSystemDirectoryW
ProcessIdToSessionId
GetLastError
DeleteFileW
LoadLibraryW
MoveFileExW
GetFileSize
GetCurrentProcessId
FreeLibrary
CopyFileW
GetTempFileNameW
MoveFileW
LoadLibraryExW
GetWindowsDirectoryW
GetModuleHandleW
GetConsoleMode
WriteConsoleW
RemoveDirectoryW
GetStringTypeW
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
ExitProcess
GetModuleHandleExW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
advapi32
RegCloseKey
ImpersonateLoggedOnUser
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
RevertToSelf
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
ShellExecuteW
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE