c:\omtnkdoj\bnwv\yogisfk\cqf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
84ddc3f10666d52330ea974630855e8f7319ddd9c352863f3e232cc15fa34e8e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84ddc3f10666d52330ea974630855e8f7319ddd9c352863f3e232cc15fa34e8e.exe
Resource
win10v2004-20240508-en
General
-
Target
84ddc3f10666d52330ea974630855e8f7319ddd9c352863f3e232cc15fa34e8e
-
Size
421KB
-
MD5
488e0c3f84e7e9831d88329ceead335d
-
SHA1
ad9b08e67d84483abdebf42e4e74e6d13ed79669
-
SHA256
84ddc3f10666d52330ea974630855e8f7319ddd9c352863f3e232cc15fa34e8e
-
SHA512
e19c8863322dddbff49a89e8d85e9ac405719f999df1ebd4e564b2d7ade161a11bc3af84ed8ad084b5962eab0cda7b24b5d7ce840722fd0b1d7ac9dcda340fb5
-
SSDEEP
12288:OtesXM0fpDxC+SipmB/VX1aIOOEOTDlG6dQekUPGxUVm:PsXM0fpDxUi4ZGOEmDlLOxU
Malware Config
Signatures
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84ddc3f10666d52330ea974630855e8f7319ddd9c352863f3e232cc15fa34e8e
Files
-
84ddc3f10666d52330ea974630855e8f7319ddd9c352863f3e232cc15fa34e8e.exe windows:5 windows x86 arch:x86
32a31bfad8ca2c4b8a1a523b9cceb9d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetOpenFileNameA
GetSaveFileNameA
gdi32
BitBlt
DeleteDC
CreateCompatibleDC
GetStockObject
SetBkColor
SetTextColor
SelectObject
GetDeviceCaps
CreateCompatibleBitmap
CreateBitmap
TextOutA
DeleteObject
kernel32
RtlUnwind
SetStdHandle
WideCharToMultiByte
GetSystemTimeAsFileTime
WriteFile
GetModuleHandleW
LeaveCriticalSection
DeleteCriticalSection
GetConsoleCP
SetConsoleCtrlHandler
Sleep
GetCurrentThreadId
RaiseException
GetStdHandle
MultiByteToWideChar
TerminateProcess
GetStringTypeW
EnumSystemLocalesW
LoadLibraryExW
ReadFile
OutputDebugStringW
GetCPInfo
HeapFree
GetModuleFileNameW
FormatMessageA
GetCurrentProcess
GetLastError
FreeEnvironmentStringsW
AreFileApisANSI
HeapSize
SetUnhandledExceptionFilter
GetModuleFileNameA
GetConsoleMode
GetEnvironmentStringsW
FlushFileBuffers
IsValidCodePage
CreateSemaphoreW
IsProcessorFeaturePresent
GetACP
EnterCriticalSection
LCMapStringW
FreeLibrary
GetProcAddress
DecodePointer
GetFileType
EncodePointer
CreateFileW
GetProcessHeap
GetOEMCP
TlsFree
CloseHandle
GetStartupInfoW
SetFilePointerEx
HeapAlloc
QueryPerformanceCounter
IsValidLocale
GetModuleHandleExW
TlsGetValue
GetLocaleInfoW
TlsSetValue
IsDebuggerPresent
CompareStringW
InitializeCriticalSectionAndSpinCount
GetDateFormatW
CreateFileA
UnhandledExceptionFilter
LoadLibraryW
SetPriorityClass
InterlockedDecrement
WriteConsoleW
GetTimeFormatW
GetModuleHandleA
HeapReAlloc
SetLastError
GetCurrentProcessId
GetCurrentThread
GetUserDefaultLCID
ExitProcess
FatalAppExitA
InterlockedExchange
InterlockedIncrement
TlsAlloc
GetCurrentDirectoryA
shell32
ShellExecuteA
user32
GetMessageA
InvalidateRect
SetDlgItemTextA
PostQuitMessage
SetCursor
PeekMessageA
DestroyWindow
AdjustWindowRect
MessageBoxA
LoadImageA
GetSystemMenu
IsIconic
DefWindowProcA
LoadStringA
RegisterClassExA
SetForegroundWindow
CloseWindow
GetCursorPos
ReleaseDC
GetSystemMetrics
LoadIconA
CreateWindowExA
ShowCursor
SetWindowPos
GetCursor
SendMessageA
RemoveMenu
GetDlgItemTextA
EndDialog
DialogBoxParamA
GetDC
LoadCursorA
DispatchMessageA
TranslateMessage
WaitMessage
winmm
timeKillEvent
PlaySoundA
timeSetEvent
Sections
.text Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 357KB - Virtual size: 361KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ