seup.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e2019a660cad0437ce90a52c9cc5c5375da75def63ccf29686db329e40f79845.exe
Resource
win7-20240221-en
General
-
Target
e2019a660cad0437ce90a52c9cc5c5375da75def63ccf29686db329e40f79845
-
Size
964KB
-
MD5
ec0a9f12f0a1868201cf0b1829679cc1
-
SHA1
e2c6387576865e69290afe46fb3d0ef94afeb8f0
-
SHA256
e2019a660cad0437ce90a52c9cc5c5375da75def63ccf29686db329e40f79845
-
SHA512
dc5596cd6431745e12fe154514ca95e8eb524f3dfccb88ef6037c233ed4811a491cc68319c459b5053905d0a6bd2957dcc1edc32fccc1fc38e314ea206c1afde
-
SSDEEP
24576:/KpK/pWfPcOP0alzdySZtiqvW+3HYgrcnavOPkwu9ed:Tkfo2W+3YAbWPkwb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2019a660cad0437ce90a52c9cc5c5375da75def63ccf29686db329e40f79845
Files
-
e2019a660cad0437ce90a52c9cc5c5375da75def63ccf29686db329e40f79845.exe windows:5 windows x86 arch:x86
2349f2f5240cfbdea97d94464a527fe1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
CreateProcessAsUserW
DuplicateTokenEx
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
gdi32
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
CreateFontW
CreatePatternBrush
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
GetCurrentObject
GetObjectW
GetStockObject
OffsetViewportOrgEx
PtInRegion
SelectObject
SetBkMode
SetTextColor
SetViewportOrgEx
msimg32
AlphaBlend
oleaut32
VarUI4FromStr
shell32
CommandLineToArgvW
SHGetFolderPathW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
Shell_NotifyIconW
shlwapi
PathAppendW
PathFileExistsW
PathFindFileNameA
PathFindFileNameW
PathGetDriveNumberW
PathRemoveFileSpecW
SHGetValueA
SHGetValueW
StrStrIW
user32
AdjustWindowRectEx
AllowSetForegroundWindow
AppendMenuW
BeginPaint
BringWindowToTop
CallWindowProcW
CharNextW
ClientToScreen
CreateDialogParamW
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawFocusRect
DrawTextW
EnableWindow
EndPaint
FillRect
FindWindowExW
FindWindowW
GetCapture
GetClassInfoExW
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetMenu
GetMessageW
GetMonitorInfoW
GetParent
GetShellWindow
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongW
GetWindowRect
GetWindowRgn
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
InflateRect
InvalidateRect
IsIconic
IsWindow
IsWindowEnabled
KillTimer
LoadCursorW
LoadImageW
MapWindowPoints
MessageBoxW
MonitorFromPoint
MonitorFromWindow
MoveWindow
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassExW
ReleaseCapture
SendMessageW
SetCapture
SetCursor
SetForegroundWindow
SetTimer
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackMouseEvent
TrackPopupMenu
TranslateMessage
UnregisterClassW
UpdateWindow
WindowFromPoint
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wininet
FtpCommandW
FtpGetFileSize
FtpOpenFileW
HttpEndRequestW
HttpOpenRequestW
HttpQueryInfoW
HttpSendRequestExW
InternetCloseHandle
InternetConnectW
InternetCrackUrlW
InternetGetLastResponseInfoW
InternetOpenW
InternetQueryOptionW
InternetReadFile
InternetReadFileExA
InternetSetOptionA
InternetSetOptionW
InternetSetStatusCallbackW
InternetWriteFile
psapi
GetModuleFileNameExW
kernel32
AssignProcessToJobObject
CancelWaitableTimer
CloseHandle
CompareStringW
CreateEventW
CreateFileA
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
CreateWaitableTimerW
DecodePointer
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExitThread
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FindNextFileW
FindResourceW
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesW
GetFileSize
GetFileSizeEx
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessId
GetProcessTimes
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadPriority
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultLangID
GetVersionExW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
HeapAlloc
HeapDestroy
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
HeapWalk
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
IsBadReadPtr
IsBadWritePtr
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MultiByteToWideChar
OpenProcess
OpenThread
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ReleaseMutex
ResetEvent
RtlCaptureStackBackTrace
RtlUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetFilePointerEx
SetFileTime
SetHandleInformation
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SizeofResource
Sleep
SwitchToThread
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpA
lstrcmpiA
lstrcmpiW
ole32
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CreateStreamOnHGlobal
comctl32
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
InitCommonControlsEx
gdiplus
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromStream
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdipFree
GdiplusShutdown
GdiplusStartup
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
winmm
timeGetTime
netapi32
Netbios
Exports
Exports
GetHandleVerifier
Sections
.text Size: 618KB - Virtual size: 617KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 145B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.voltbl Size: 512B - Virtual size: 306B
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 88KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE