c:\jenkins\workspace\Client\Client\Windows\release\bin\X64\release\ZoomUpdater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
df64097bda15cd0627937feaea868bae801520ec024c256b4b8783c287daaa2f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df64097bda15cd0627937feaea868bae801520ec024c256b4b8783c287daaa2f.exe
Resource
win10v2004-20240508-en
General
-
Target
df64097bda15cd0627937feaea868bae801520ec024c256b4b8783c287daaa2f
-
Size
1.5MB
-
MD5
af483e2df3f3f3156f7fd0ee103de42f
-
SHA1
104e0d90bc09d7c08c5e58f9e00f29fe4ca821ec
-
SHA256
df64097bda15cd0627937feaea868bae801520ec024c256b4b8783c287daaa2f
-
SHA512
f2e37eed358503d31405a7cad6aae3e7748d2dbc3f570853689b1626f773b9234d9cf11a94636c9ce13c3958e52fcd32d0fa65d5fad0bdc59231f83cfe37a91a
-
SSDEEP
12288:iZ5yI77vMzr83S1VVpERVgiqm85/ZMmoCV+SCGoNbq88ULbDg8pRBXOQE:idkzr8EzERVY7zpCGSbvdfvDJO5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df64097bda15cd0627937feaea868bae801520ec024c256b4b8783c287daaa2f
Files
-
df64097bda15cd0627937feaea868bae801520ec024c256b4b8783c287daaa2f.exe windows:6 windows x64 arch:x64
381153af32063231cbbd08f22f709db3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shlwapi
PathAppendW
PathFileExistsW
PathRemoveBackslashW
PathRemoveFileSpecW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WTHelperGetProvCertFromChain
crypt32
CertGetNameStringW
kernel32
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
HeapFree
CreateFileW
GetModuleHandleA
CloseHandle
HeapAlloc
GetProcAddress
GetProcessHeap
CreateDirectoryW
ReadFile
FindFirstFileW
SetLastError
GetCommandLineW
FindNextFileW
GetCurrentProcess
WriteFile
GetConsoleCP
GetModuleFileNameW
SetFilePointer
SetEndOfFile
GetTempPathW
FindClose
GetFileAttributesW
GetSystemDirectoryW
ProcessIdToSessionId
GetLastError
DeleteFileW
LoadLibraryW
MoveFileExW
GetFileSize
GetCurrentProcessId
FreeLibrary
CopyFileW
GetTempFileNameW
MoveFileW
LoadLibraryExW
GetWindowsDirectoryW
GetModuleHandleW
GetConsoleMode
WriteConsoleW
RemoveDirectoryW
GetStringTypeW
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
ExitProcess
GetModuleHandleExW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
advapi32
RegCloseKey
ImpersonateLoggedOnUser
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
RevertToSelf
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
ShellExecuteW
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE