C:\BITDIR\AVRETAIL\qhav\bin\Upgrade\x64\Release\upgui.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3b87023bbe2071ae1e73efd80e07d2e45dd25c87aa012262ce0ebf9eff17c857.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b87023bbe2071ae1e73efd80e07d2e45dd25c87aa012262ce0ebf9eff17c857.exe
Resource
win10v2004-20240226-en
General
-
Target
3b87023bbe2071ae1e73efd80e07d2e45dd25c87aa012262ce0ebf9eff17c857
-
Size
2.0MB
-
MD5
003f51192624bced78bdd58a567ca53b
-
SHA1
2bc2d906774ef1a12f52e73b8d24db50f21dc875
-
SHA256
3b87023bbe2071ae1e73efd80e07d2e45dd25c87aa012262ce0ebf9eff17c857
-
SHA512
d9b9c97fcb41bb70609790e6baa4818f133a431d4280e43a11e0376211fd6bd6001cf26babbbab3488f7feba25cd29cbf0858f4a735951b1a9701fa37954fc43
-
SSDEEP
49152:8vuoywWR8iodHKzWFdiZe+I71DJ+G/eplpVwdO3whXqcu23:ilyRuief75WmO3whXqcu23
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b87023bbe2071ae1e73efd80e07d2e45dd25c87aa012262ce0ebf9eff17c857
Files
-
3b87023bbe2071ae1e73efd80e07d2e45dd25c87aa012262ce0ebf9eff17c857.exe windows:6 windows x64 arch:x64
94580cea63b75c7571249756243fa337
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
DeleteCriticalSection
GetLongPathNameW
GetModuleFileNameW
WideCharToMultiByte
GetPrivateProfileIntW
GetPrivateProfileStringW
OutputDebugStringW
FreeLibrary
LoadLibraryExW
GetCommandLineW
LocalFree
MultiByteToWideChar
WriteFile
CreateFileW
CloseHandle
OutputDebugStringA
LocalAlloc
LoadLibraryA
SizeofResource
HeapFree
InitializeCriticalSection
CreateMutexW
InitializeCriticalSectionEx
ReleaseMutex
HeapSize
LockResource
HeapReAlloc
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
GetCurrentDirectoryW
HeapDestroy
SetCurrentDirectoryW
GetWindowsDirectoryW
GetProcessHeap
CopyFileW
OpenMutexW
WriteConsoleW
FlushFileBuffers
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
VerSetConditionMask
IsProcessorFeaturePresent
GetProcAddress
GetLastError
GetFullPathNameW
GetVersionExW
GetCommandLineA
GetCPInfo
GetOEMCP
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetConsoleMode
GetFileType
GetFileAttributesExW
ExitProcess
GetModuleHandleExW
GetStdHandle
SetStdHandle
SetFilePointerEx
GetConsoleOutputCP
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
user32
GetSystemMetrics
advapi32
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
shell32
CommandLineToArgvW
Sections
.text Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Y)0 Size: 374KB - Virtual size: 376KB
IMAGE_SCN_MEM_READ