D:\Downloads\CODEX\UEViewer-master_1579_UE5\UEViewer-master\umodel.pdb
Static task
static1
Behavioral task
behavioral1
Sample
umodel_materials_ue5.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
umodel_materials_ue5.exe
Resource
win10v2004-20240426-en
General
-
Target
umodel_materials_ue5.exe
-
Size
1.7MB
-
MD5
5ee351aeae8a010fa96648993ac524e4
-
SHA1
53c0d9f390d72f6a0a14482c1d93f625e4a0fcdc
-
SHA256
c4947e183654dc8911bd1531b28846bc4872c671b229ae7b1fb42b4b8b102f26
-
SHA512
fa7efd1d45d68b5201c0c9801f30252996d493580d653cc9300180c5bf30e84641b72f1285f6453875feb07c93e439c674f487dbc61511545e9bd8d69edc5d5e
-
SSDEEP
24576:KT/AwEwqbSx1F3c1Y4BFTJs1A50XF+/ts4WXVSynIroOflcieq6fWrQLLhL2GkcB:6v2Y4BZJOAA6tvWgoOPeqVSLQGF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource umodel_materials_ue5.exe
Files
-
umodel_materials_ue5.exe.exe windows:5 windows x64 arch:x64
b2669f9ddef2bdd4b8470de8cc288887
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
SendMessageA
CloseClipboard
EmptyClipboard
SetClipboardData
LoadIconA
SetMenuItemInfoA
InsertMenuItemA
TrackPopupMenuEx
DeleteMenu
AppendMenuA
GetMenuItemCount
EnableMenuItem
CheckMenuItem
DestroyMenu
CreatePopupMenu
CreateMenu
DrawMenuBar
SetMenu
LoadImageA
GetParent
SetWindowLongPtrA
GetWindowLongPtrA
SetWindowLongA
GetWindowLongA
GetSysColor
ScreenToClient
GetCursorPos
AdjustWindowRect
GetWindowRect
GetClientRect
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
LockWindowUpdate
InvalidateRect
ReleaseDC
GetDC
SetForegroundWindow
GetSystemMetrics
IsWindowEnabled
EnableWindow
GetKeyState
IsDlgButtonChecked
CheckDlgButton
EndDialog
DialogBoxIndirectParamA
CreateDialogIndirectParamA
SetWindowPos
MoveWindow
ShowWindow
CreateWindowExA
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
OpenClipboard
gdi32
SetTextColor
SelectObject
GetTextExtentPoint32A
CreateSolidBrush
comctl32
ord410
InitCommonControlsEx
ImageList_Create
ord413
ord17
ImageList_ReplaceIcon
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
shlwapi
SHAutoComplete
kernel32
CreateDirectoryW
FlushFileBuffers
WideCharToMultiByte
SetStdHandle
GetFileSizeEx
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
DeleteFileW
LCMapStringW
CompareStringW
MultiByteToWideChar
GetFullPathNameW
GetCommandLineA
WriteFile
GetStdHandle
GetModuleFileNameW
GetCPInfo
FreeLibraryAndExitThread
ExitThread
CreateThread
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindNextFileW
FindFirstFileExW
FindClose
ReadFile
GetModuleHandleExW
LoadLibraryExW
GetCurrentDirectoryW
HeapReAlloc
IsValidCodePage
GetACP
GetCommandLineW
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
GetTimeZoneInformation
HeapSize
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
SetLastError
RtlUnwind
RtlPcToFileHeader
SetEndOfFile
SetConsoleCtrlHandler
GetModuleHandleA
LoadLibraryA
GetTickCount
VirtualQuery
GetModuleFileNameA
GlobalAlloc
GlobalUnlock
GlobalLock
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
WaitForSingleObject
Sleep
GetCurrentThreadId
ResumeThread
GetNativeSystemInfo
CreateSemaphoreA
WriteConsoleW
FreeLibrary
GetProcAddress
VerSetConditionMask
VerifyVersionInfoW
ExitProcess
RaiseException
GetLastError
GetSystemInfo
VirtualProtect
GetModuleHandleW
LoadLibraryExA
OutputDebugStringA
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwindEx
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 418KB - Virtual size: 417KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ