C:\rtjov\dghovq\bfgn\26b4f6ba40d941268ec4f8b020ae4c8b\tyibzl\ugtrvlet\Release\ugtrvlet.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dae9e43b8cc525890bbad055ef152404.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dae9e43b8cc525890bbad055ef152404.exe
Resource
win10v2004-20240226-en
General
-
Target
dae9e43b8cc525890bbad055ef152404
-
Size
449KB
-
MD5
dae9e43b8cc525890bbad055ef152404
-
SHA1
92a8b576eaed66f2f3be4448dea895bf648c25a0
-
SHA256
05c39991c269da208a3eac63dee75d2e3e7575530a69b6a37c1d0244bb0ff7ff
-
SHA512
bd772b405dd4a230ef77f82114faf78d9af3da87e093288083d570402ab7729ca5a7583219cbbf12d78413bbeae072920bf324096f227ac13f4c944f20b7ee48
-
SSDEEP
6144:/6+SCTKMjPaO5NOpII5jm/JMuOHW+eJoPU/LzGz///c0oQkM57seJsmFdVVt:iyTpCOmpII5jmlboM/+z/FNkM57s0F3f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dae9e43b8cc525890bbad055ef152404
Files
-
dae9e43b8cc525890bbad055ef152404.exe windows:6 windows x86 arch:x86
e9aef503b3e4a8eb831af674be5da9e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
CreateHardLinkW
CreateProcessW
CreateSymbolicLinkW
DecodePointer
DeleteCriticalSection
DeleteFileW
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetTimeFormatW
GetVolumeInformationW
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LocalAlloc
LocalFree
MoveFileExW
MoveFileW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RemoveDirectoryW
RtlUnwind
SearchPathW
SetConsoleCursorPosition
SetConsoleMode
SetConsoleTextAttribute
SetConsoleTitleW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SetVolumeLabelW
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
user32
CharNextExA
CharUpperBuffW
GetDC
GrayStringA
IsCharAlphaNumericW
IsCharAlphaW
LoadStringW
MessageBoxA
wsprintfW
shell32
FindExecutableW
SHFileOperationW
SHGetFileInfoW
advapi32
GetFileSecurityW
GetSecurityDescriptorOwner
LookupAccountSidW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.voltbl Size: 512B - Virtual size: 97B
.rsrc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ