D:\Project_AutoUpdate\VS2019\wmcInst\Release\ManualUpdate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae482a140132c2c61bff6d6147a61325c92d96e91410a00cb01a15d2af35481d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae482a140132c2c61bff6d6147a61325c92d96e91410a00cb01a15d2af35481d.exe
Resource
win10v2004-20240802-en
General
-
Target
ae482a140132c2c61bff6d6147a61325c92d96e91410a00cb01a15d2af35481d
-
Size
11.3MB
-
MD5
e2a715aa1a7496d6017914a3a3612876
-
SHA1
aa7e950132d76236556b47ac6a317e898af830a4
-
SHA256
ae482a140132c2c61bff6d6147a61325c92d96e91410a00cb01a15d2af35481d
-
SHA512
4e2f0cbb810f65bb84deac8dbfa030798f351d4847a0a584995519dc316eb0da94a7807d103e99f8b6c8906ce58fcd37257a48a1df5dc8ef7a4cb3533d6e385a
-
SSDEEP
196608:XdyVlTO3Ya8uaMGjngUiZbHY1JRWdGlpIE+bwG4m56S+PjnXLtModWTpbBA:Nn3W9jndiAebn56Jhz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae482a140132c2c61bff6d6147a61325c92d96e91410a00cb01a15d2af35481d
Files
-
ae482a140132c2c61bff6d6147a61325c92d96e91410a00cb01a15d2af35481d.exe windows:5 windows x86 arch:x86
cfed2a0ebfe7723f774bb927a1f09a74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateMutexW
InterlockedDecrement
CompareFileTime
GetPrivateProfileStringW
InitializeCriticalSectionAndSpinCount
TerminateProcess
WritePrivateProfileStringW
FindFirstFileA
OpenMutexW
FindNextFileA
GetWindowsDirectoryW
GetExitCodeProcess
GetPrivateProfileStringA
CreateSemaphoreW
lstrlenA
SetEnvironmentVariableA
CompareStringW
ExitProcess
HeapSize
IsProcessorFeaturePresent
GetTimeZoneInformation
WriteConsoleW
FlushFileBuffers
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
RemoveDirectoryW
GetStringTypeW
RaiseException
LocalFileTimeToFileTime
HeapReAlloc
GetPrivateProfileIntW
MoveFileW
GetSystemDirectoryA
ReadFile
LoadLibraryW
GetSystemDirectoryW
WriteFile
GetWindowsDirectoryA
WaitForSingleObject
CreateDirectoryW
CreateProcessW
FreeLibrary
GetCurrentThreadId
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
FormatMessageW
GetCurrentProcessId
MultiByteToWideChar
OpenProcess
GetProcessHeap
HeapFree
GetCurrentProcess
HeapAlloc
LocalFree
FileTimeToLocalFileTime
CreateToolhelp32Snapshot
Process32NextW
LocalAlloc
Process32FirstW
GetFileSize
FindClose
GetProcAddress
lstrlenW
FileTimeToSystemTime
GetVersionExW
Sleep
GetModuleHandleW
GetComputerNameW
FindFirstFileW
GetSystemDefaultLangID
SetFileAttributesW
CloseHandle
OutputDebugStringA
CreateFileMappingW
GetLastError
CreateFileW
GetModuleFileNameW
CopyFileW
OutputDebugStringW
SetFilePointerEx
SetEndOfFile
UnmapViewOfFile
GetFullPathNameA
LCMapStringW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedIncrement
GetCPInfo
SystemTimeToFileTime
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
RtlUnwind
GetConsoleMode
GetConsoleCP
SetStdHandle
DeleteCriticalSection
GetFileType
SetHandleCount
WideCharToMultiByte
SetFileTime
CreateFileA
SetFilePointer
DosDateTimeToFileTime
ExpandEnvironmentStringsW
DeleteFileW
WinExec
FindNextFileW
EncodePointer
GetStdHandle
HeapCreate
MapViewOfFile
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
GetDriveTypeW
FindFirstFileExW
GetFileAttributesW
GetDriveTypeA
FindFirstFileExA
DecodePointer
ExitThread
CreateThread
GetCommandLineW
user32
LoadIconW
RegisterClassExW
TranslateMessage
MessageBoxW
LoadStringW
wsprintfA
DispatchMessageW
DefWindowProcW
SendMessageW
GetSystemMetrics
ShowWindow
CreateWindowExW
wsprintfW
GetMessageW
PostMessageW
FindWindowW
EndPaint
BeginPaint
PostQuitMessage
SetForegroundWindow
LoadCursorW
PostThreadMessageW
gdi32
GetStockObject
SetBkMode
advapi32
CryptDestroyKey
CloseServiceHandle
ChangeServiceConfig2W
QueryServiceObjectSecurity
SetServiceObjectSecurity
DeleteService
ControlService
StartServiceW
RegQueryValueExA
CreateProcessWithLogonW
LookupAccountSidW
GetTokenInformation
RegSetValueExW
RegEnumKeyExW
OpenSCManagerA
RegDeleteValueW
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyW
InitializeSecurityDescriptor
RegCreateKeyExW
RegSetValueExA
OpenServiceA
CryptEncrypt
CryptImportKey
CryptReleaseContext
CryptAcquireContextW
GetSecurityDescriptorDacl
AdjustTokenPrivileges
BuildExplicitAccessWithNameW
SetEntriesInAclW
SetKernelObjectSecurity
MakeAbsoluteSD
ImpersonateLoggedOnUser
DuplicateTokenEx
LookupPrivilegeValueW
SetSecurityDescriptorDacl
CreateProcessAsUserW
GetKernelObjectSecurity
OpenProcessToken
RegCloseKey
CheckTokenMembership
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
OpenServiceW
GetUserNameW
OpenSCManagerW
shell32
ShellExecuteW
SHCreateDirectoryExW
ShellExecuteExW
ole32
CoInitializeEx
CoInitialize
CoUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
oleaut32
SafeArrayUnaccessData
SysAllocString
SysFreeString
SafeArrayGetLBound
VariantClear
SafeArrayAccessData
VariantInit
SafeArrayGetUBound
version
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wintrust
WinVerifyTrust
cabinet
ord22
ord23
ord20
crypt32
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptMsgClose
CryptMsgGetParam
comctl32
ord17
mpr
WNetAddConnection2W
WNetCancelConnection2W
psapi
GetProcessImageFileNameW
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ