upg351db.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f9c8b12667d54afc7b6f1b153c9620b2692702b39ea745cfe30d12f159337dbe.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f9c8b12667d54afc7b6f1b153c9620b2692702b39ea745cfe30d12f159337dbe.exe
Resource
win10v2004-20240802-en
General
-
Target
f9c8b12667d54afc7b6f1b153c9620b2692702b39ea745cfe30d12f159337dbe
-
Size
308KB
-
MD5
328f6362623b068a1e927ec5b1069ca5
-
SHA1
e39e9aeb4c964e46d9f3c14fb0f16c21ca8af902
-
SHA256
f9c8b12667d54afc7b6f1b153c9620b2692702b39ea745cfe30d12f159337dbe
-
SHA512
b03f96e9e5b5e4bd8cd403bfdc898d0db517fe2253078edc1a198cd35ca057488f95a36a6726245d55adb25ae279626fdfe9d24605256908d958200bd5480490
-
SSDEEP
6144:dtch7mrw3VCw2NHZ99mjsRLY+D+UC3tTKV2an6cEn:duh7mrw3V9Ov9mjsRLYf3hPanon
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9c8b12667d54afc7b6f1b153c9620b2692702b39ea745cfe30d12f159337dbe
Files
-
f9c8b12667d54afc7b6f1b153c9620b2692702b39ea745cfe30d12f159337dbe.exe windows:5 windows x86 arch:x86
4ffbfdfa19d1a3e2c5581400aec68548
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
_cexit
_XcptFilter
_exit
_c_exit
_except_handler3
strchr
atoi
getchar
strrchr
exit
_strnicmp
rand
printf
fopen
fclose
fprintf
fflush
strncmp
memmove
wcslen
swprintf
sprintf
strncpy
_strupr
toupper
_splitpath
_stricmp
_makepath
_fullpath
advapi32
ReportEventA
RegOpenKeyA
RegisterEventSourceA
DeregisterEventSource
SetSecurityDescriptorDacl
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
FreeSid
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
kernel32
GetProcAddress
WaitForSingleObjectEx
GetTickCount
InterlockedIncrement
GetFileSize
SetEndOfFile
GetSystemInfo
CreateSemaphoreA
OpenSemaphoreA
CopyFileA
WriteFileEx
ReadFileEx
LoadLibraryA
ReadFile
FindNextFileA
FindFirstFileA
CreateDirectoryA
lstrcpyA
LCMapStringW
WaitForMultipleObjects
InterlockedDecrement
OpenFileMappingA
MapViewOfFile
OpenEventA
FreeLibrary
GetModuleHandleA
GetDiskFreeSpaceA
FormatMessageA
MoveFileExA
SetCurrentDirectoryA
GetCurrentDirectoryA
ResetEvent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
OpenMutexA
WriteFile
EnterCriticalSection
LeaveCriticalSection
GlobalAlloc
GlobalFree
InitializeCriticalSection
DeleteCriticalSection
GetLastError
SetFilePointer
VirtualAlloc
VirtualFree
CreateEventA
UnmapViewOfFile
WaitForSingleObject
GetCurrentProcessId
GetModuleFileNameA
CompareStringW
GetUserDefaultLangID
GetSystemDefaultLangID
SleepEx
Sleep
SetThreadPriority
CreateThread
GetExitCodeThread
SetEvent
ExpandEnvironmentStringsA
lstrcmpA
lstrlenA
CloseHandle
GetLocalTime
CreateFileA
GetFileAttributesA
FindClose
DeleteFileA
MoveFileA
ReleaseMutex
ReleaseSemaphore
CreateMutexA
user32
CharToOemA
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE