WindowsAnytimeUpgradeResults.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1e319fa081adc7d3c504a5e7e7bbcc39eb4278df5d54b1b6879f2d0832a6a19d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1e319fa081adc7d3c504a5e7e7bbcc39eb4278df5d54b1b6879f2d0832a6a19d.exe
Resource
win10v2004-20240802-en
General
-
Target
1e319fa081adc7d3c504a5e7e7bbcc39eb4278df5d54b1b6879f2d0832a6a19d
-
Size
286KB
-
MD5
50fbbe96223f6546093e1d1d1718e385
-
SHA1
d8abcec1ed8c0a7b22ca09f5aa80970997f9b87f
-
SHA256
1e319fa081adc7d3c504a5e7e7bbcc39eb4278df5d54b1b6879f2d0832a6a19d
-
SHA512
bf492b4ea66866a9779861939ea57ac0f22180c97d288bb21186242991551ce8ce7e65bd48149cf043332310975cdb8259c5fb09874afa2bf82b356ca7447831
-
SSDEEP
6144:6Vt7h51Nq/DQM7vpUWolNwBFz8bEJoP6iR3WlQ60y:W7T/qcqpElEw4YVRLx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e319fa081adc7d3c504a5e7e7bbcc39eb4278df5d54b1b6879f2d0832a6a19d
Files
-
1e319fa081adc7d3c504a5e7e7bbcc39eb4278df5d54b1b6879f2d0832a6a19d.exe windows:6 windows x86 arch:x86
df8245b0ae8c055f400cea6a1dd931f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
kernel32
GetProductInfo
GetSystemTime
SystemTimeToFileTime
CreateEventW
Sleep
InterlockedExchange
HeapAlloc
GetProcessHeap
MultiByteToWideChar
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GlobalFree
GetLocalTime
CreateFileW
CreateDirectoryW
GetVersionExW
WideCharToMultiByte
lstrlenA
WriteFile
CloseHandle
SetLastError
MulDiv
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
LocalFree
FreeLibrary
InterlockedCompareExchange
LoadLibraryExW
lstrcmpiW
ExpandEnvironmentStringsW
GetLastError
GetTickCount
LoadLibraryW
GetUserDefaultUILanguage
SetFilePointer
GetProcAddress
gdi32
GetDeviceCaps
DeleteObject
user32
SetForegroundWindow
FindWindowW
LoadStringW
SystemParametersInfoW
DispatchMessageW
CallWindowProcW
GetMessageW
AllowSetForegroundWindow
SetProcessDPIAware
PostQuitMessage
LoadImageW
PostMessageW
LoadIconW
SetWindowLongW
ShowWindow
TranslateMessage
GetWindowPlacement
GetDC
IsProcessDPIAware
SendMessageW
ReleaseDC
msvcrt
_purecall
??2@YAPAXI@Z
_vsnwprintf
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
memset
_initterm
_amsg_exit
??3@YAXPAX@Z
__setusermatherr
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_acmdln
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
SysAllocString
shell32
ShellExecuteW
ShellExecuteExW
uxtheme
SetWindowThemeAttribute
dui70
?GetEnabled@Element@DirectUI@@QAE_NXZ
?FireEvent@Element@DirectUI@@QAEXPAUEvent@2@_N1@Z
?KeyboardNavigate@Element@DirectUI@@SG?AVUID@@XZ
?SetSelected@Element@DirectUI@@QAEJ_N@Z
?CreateGraphic@Value@DirectUI@@SGPAV12@PAUHICON__@@_N11@Z
?CreateGraphic@Value@DirectUI@@SGPAV12@PAUHBITMAP__@@EI_N11@Z
?ContentProp@Element@DirectUI@@SGPBUPropertyInfo@2@XZ
?SetValue@Element@DirectUI@@QAEJP6GPBUPropertyInfo@2@XZHPAVValue@2@@Z
?Release@Value@DirectUI@@QAEXXZ
?SetAccName@Element@DirectUI@@QAEJPBG@Z
?GetContentString@Element@DirectUI@@QAEPBGPAPAVValue@2@@Z
?RemoveListener@Element@DirectUI@@QAEXPAUIElementListener@2@@Z
?Remove@Element@DirectUI@@QAEJPAV12@@Z
??1NativeHWNDHost@DirectUI@@UAE@XZ
?DestroyWindow@NativeHWNDHost@DirectUI@@QAEXXZ
?OnMessage@NativeHWNDHost@DirectUI@@UAEJIIJPAJ@Z
?StartDefer@Element@DirectUI@@QAEXPAK@Z
?SetEnabled@Element@DirectUI@@QAEJ_N@Z
?Destroy@Element@DirectUI@@QAEJ_N@Z
?GetID@Element@DirectUI@@QAEGXZ
?Click@Button@DirectUI@@SG?AVUID@@XZ
??0NativeHWNDHost@DirectUI@@QAE@XZ
InitThread
UnInitThread
?Initialize@NativeHWNDHost@DirectUI@@QAEJPBG0PAUHWND__@@PAUHICON__@@HHHHHHPAUHINSTANCE__@@I@Z
?Destroy@NativeHWNDHost@DirectUI@@QAEXXZ
?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ
UnInitProcessPriv
InitProcessPriv
?Create@HWNDElement@DirectUI@@SGJPAUHWND__@@_NIPAVElement@2@PAKPAPAV42@@Z
?Host@NativeHWNDHost@DirectUI@@QAEXPAVElement@2@@Z
?Create@BorderLayout@DirectUI@@SGJPAPAVLayout@2@@Z
?SetLayout@Element@DirectUI@@QAEJPAVLayout@2@@Z
?SetVisible@Element@DirectUI@@QAEJ_N@Z
?SetAccessible@Element@DirectUI@@QAEJ_N@Z
??0DUIFactory@DirectUI@@QAE@PAUHWND__@@@Z
?LoadFromResource@DUIFactory@DirectUI@@QAEJPAUHINSTANCE__@@PBG1PAVElement@2@PAKPAPAV42@1@Z
??1DUIFactory@DirectUI@@QAE@XZ
?Add@Element@DirectUI@@QAEJPAV12@@Z
StrToID
?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z
?SetContentString@Element@DirectUI@@QAEJPBG@Z
?AddListener@Element@DirectUI@@QAEJPAUIElementListener@2@@Z
?EndDefer@Element@DirectUI@@QAEXK@Z
?ShowWindow@NativeHWNDHost@DirectUI@@QAEXH@Z
winbrand
BrandingLoadString
BrandingFormatString
BrandingLoadImage
ntdll
WinSqmSetDWORD
WinSqmIsOptedIn
WinSqmStartSession
WinSqmAddToStream
WinSqmEndSession
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE