D:\Jenkins\.jenkins\workspace\lib_common\universal_popup\universal_popup\Release\universal_notify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
04ec6fb3e370adfdde28507d05b19ed68609b2b47c15c4c0eb930e5ed5e55326.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
04ec6fb3e370adfdde28507d05b19ed68609b2b47c15c4c0eb930e5ed5e55326.dll
Resource
win10v2004-20240802-en
General
-
Target
04ec6fb3e370adfdde28507d05b19ed68609b2b47c15c4c0eb930e5ed5e55326
-
Size
917KB
-
MD5
07a53a0c2e25b0eef75c8a7c93fb4cf1
-
SHA1
726272d4de041312f2285e4b91f676fd1e5120d7
-
SHA256
04ec6fb3e370adfdde28507d05b19ed68609b2b47c15c4c0eb930e5ed5e55326
-
SHA512
62912da8e0eae80f6da3032da4b10efd5fb47128bb8b7bc80ab46025b1cd59f240ad2a48bd26a70c24f851db29320bf0b730590169656179b8de49553e0ca7fc
-
SSDEEP
24576:LXL6Q5Ohe+7T519/iMRBrziliODY7Ezjws4Jie:rLNkjNLogEzjws4Jie
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04ec6fb3e370adfdde28507d05b19ed68609b2b47c15c4c0eb930e5ed5e55326
Files
-
04ec6fb3e370adfdde28507d05b19ed68609b2b47c15c4c0eb930e5ed5e55326.dll windows:6 windows x86 arch:x86
95bb3bc8606461142fa0ca5eb31d9665
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
lstrcmpiW
LoadLibraryExW
GetModuleHandleW
FreeLibrary
SetLastError
GetDiskFreeSpaceExW
GetModuleFileNameW
GetCurrentThreadId
WaitForSingleObject
CloseHandle
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
LoadLibraryW
GetProcAddress
GetLocalTime
MultiByteToWideChar
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
ReleaseSemaphore
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
OpenProcess
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
GetACP
GetModuleFileNameA
ExitProcess
HeapSize
K32GetModuleFileNameExW
GetLastError
RaiseException
DecodePointer
FindNextFileW
FindFirstFileW
FindClose
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
EncodePointer
WideCharToMultiByte
GetStringTypeW
FormatMessageW
TryEnterCriticalSection
QueryPerformanceCounter
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
DuplicateHandle
WaitForSingleObjectEx
Sleep
GetCurrentProcess
GetCurrentThread
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
InterlockedIncrement
InterlockedDecrement
DeleteFileW
LocalFree
GetCurrentProcessId
ReleaseMutex
CreateMutexW
CreateFileW
ReadFile
WriteFile
WaitNamedPipeW
SetEvent
WaitForMultipleObjectsEx
CreateSemaphoreW
InterlockedCompareExchange
FreeResource
GetSystemWindowsDirectoryW
GetVersionExW
DeviceIoControl
lstrcmpA
FlushFileBuffers
FindNextFileA
GetFileSizeEx
CreateProcessW
GetStartupInfoW
CopyFileW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
VirtualProtect
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
lstrcmpiA
GetSystemDirectoryW
CreateFileA
RtlUnwind
ExitThread
GetModuleHandleExW
GetFileType
SetFilePointerEx
user32
SendMessageW
GetWindowInfo
GetMonitorInfoW
MonitorFromPoint
GetWindow
GetWindowThreadProcessId
GetShellWindow
PostQuitMessage
GetDesktopWindow
WindowFromPoint
GetWindowRect
GetForegroundWindow
GetSystemMetrics
KillTimer
SetTimer
SendMessageTimeoutW
LoadCursorW
SetWindowLongW
GetWindowLongW
CharNextW
DestroyWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
UnregisterClassW
PostMessageW
WaitForInputIdle
wsprintfW
FindWindowW
GetAncestor
advapi32
RegGetValueW
RegQueryValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
GetTokenInformation
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ole32
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoCreateGuid
oleaut32
VarUI4FromStr
shlwapi
SHSetValueW
SHGetValueW
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
StrStrIA
PathCombineW
StrTrimA
StrCmpNIW
StrStrIW
StrCmpIW
PathFindFileNameW
SHGetValueA
wnsprintfW
SHSetValueA
PathIsRelativeW
PathIsRootW
PathIsDirectoryW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
Exports
Exports
CreateTrayClient
Sections
.text Size: 688KB - Virtual size: 687KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ