upnpcont.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aceab301b33dace28a51dcfddae10c5b708a0bf48f62ce1d6b2eb4bc128e3f41.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aceab301b33dace28a51dcfddae10c5b708a0bf48f62ce1d6b2eb4bc128e3f41.exe
Resource
win10v2004-20240508-en
General
-
Target
aceab301b33dace28a51dcfddae10c5b708a0bf48f62ce1d6b2eb4bc128e3f41
-
Size
43KB
-
MD5
ccf665474fa3f4234ade825f64c58936
-
SHA1
5b63006458982daeb08434bce9cbda5be11df4ee
-
SHA256
aceab301b33dace28a51dcfddae10c5b708a0bf48f62ce1d6b2eb4bc128e3f41
-
SHA512
2cc176915ceb6f57d768834a681779eddd10c80bf835de952d1c935a0d856740de3fa103ae8b5d9cf69d40c724573a9e7c0ac9c1ff5179b1fcb46203e19f732f
-
SSDEEP
768:bYwIYo2xVf03UvlkvshZlx+G99TghLUVsV2zBsXeTogrWlIbzvt/dq:5IAP08+v6lYBFUVsV0BCVgilIbzt/w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aceab301b33dace28a51dcfddae10c5b708a0bf48f62ce1d6b2eb4bc128e3f41
Files
-
aceab301b33dace28a51dcfddae10c5b708a0bf48f62ce1d6b2eb4bc128e3f41.exe windows:5 windows x86 arch:x86
2af7446deb1c3f94f90d33dad47b595a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
exit
_cexit
_XcptFilter
_exit
_c_exit
_purecall
??3@YAXPAX@Z
_beginthreadex
??2@YAPAXI@Z
free
_endthreadex
atl
ord20
ord17
ord23
ord57
ord18
ord21
ord16
ord32
advapi32
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetTickCount
QueryPerformanceCounter
GetCommandLineW
lstrcmpiW
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
GetLastError
InterlockedCompareExchange
ExitProcess
UnregisterWait
CreateThread
RegisterWaitForSingleObject
GetCurrentProcessId
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
SetEvent
CloseHandle
WaitForSingleObject
GetModuleFileNameW
CreateEventW
GetFullPathNameW
OpenProcess
user32
GetMessageW
DispatchMessageW
DestroyWindow
CharNextW
PostThreadMessageW
ole32
CoInitializeEx
CoInitializeSecurity
CoResumeClassObjects
CoUninitialize
CoSuspendClassObjects
CoCreateInstance
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 364B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE