upnpcont.pdb
Static task
static1
Behavioral task
behavioral1
Sample
95594b8d304cd03ef4a1dd08547a9b417d659622b9955766dc252ed98e863d70.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
95594b8d304cd03ef4a1dd08547a9b417d659622b9955766dc252ed98e863d70.exe
Resource
win10v2004-20240426-en
General
-
Target
95594b8d304cd03ef4a1dd08547a9b417d659622b9955766dc252ed98e863d70
-
Size
43KB
-
MD5
fa70f3b27921f712359c628d4325641f
-
SHA1
5b1bd739c15e02af642a438dcc5a931c99e9971a
-
SHA256
95594b8d304cd03ef4a1dd08547a9b417d659622b9955766dc252ed98e863d70
-
SHA512
4d9d78f58b7e34909008489a181b54200771cf26ac65736739dbd616b35db158c670214dfcb38e8213d2b538d45e635c63facba1fe13105369aaabb2a591c8d4
-
SSDEEP
768:vYwIYo2xVf03Uvl33CHV0Bq7au2+diHV24q/VtZrvPGVLvhym4kIr/shmHiYv:FIAP08134P2L2JVnTGVz94kIrshw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95594b8d304cd03ef4a1dd08547a9b417d659622b9955766dc252ed98e863d70
Files
-
95594b8d304cd03ef4a1dd08547a9b417d659622b9955766dc252ed98e863d70.exe windows:5 windows x86 arch:x86
2af7446deb1c3f94f90d33dad47b595a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
exit
_cexit
_XcptFilter
_exit
_c_exit
_purecall
??3@YAXPAX@Z
_beginthreadex
??2@YAPAXI@Z
free
_endthreadex
atl
ord20
ord17
ord23
ord57
ord18
ord21
ord16
ord32
advapi32
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetTickCount
QueryPerformanceCounter
GetCommandLineW
lstrcmpiW
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
GetLastError
InterlockedCompareExchange
ExitProcess
UnregisterWait
CreateThread
RegisterWaitForSingleObject
GetCurrentProcessId
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
SetEvent
CloseHandle
WaitForSingleObject
GetModuleFileNameW
CreateEventW
GetFullPathNameW
OpenProcess
user32
GetMessageW
DispatchMessageW
DestroyWindow
CharNextW
PostThreadMessageW
ole32
CoInitializeEx
CoInitializeSecurity
CoResumeClassObjects
CoUninitialize
CoSuspendClassObjects
CoCreateInstance
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 364B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE