uad_ng.pdb
Static task
static1
Behavioral task
behavioral1
Sample
uad-ng-windows.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
uad-ng-windows.exe
Resource
win10v2004-20240802-en
General
-
Target
uad-ng-windows.exe
-
Size
14.5MB
-
MD5
362e5385b98789337294b4ee25e754b7
-
SHA1
8c6f293814d708683f013513fdd071356360b623
-
SHA256
edd3594d15bd86495a90eb85620481f6a339e0d926cfffdd9c0f07e61dcfe365
-
SHA512
046e87d2b4044220857a09b9274bee36a8e4b276afde240c921ef835883a2f93e2245f2c7b21b9cb415125408b22bc601f6e4c3ba51c7b3451ab0a501747b1e3
-
SSDEEP
98304:6cSXdrby4Ucaba5C+CH4919m1tOUC6mFkGDQyQojzVm5Kr3Org5+/kRtpkoUeOiO:UdySKME85npVVbMux
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource uad-ng-windows.exe
Files
-
uad-ng-windows.exe.exe windows:6 windows x64 arch:x64
08ef86eaad1147e0b866b6dabbf42c1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WakeByAddressSingle
WakeByAddressAll
WaitOnAddress
bcryptprimitives
ProcessPrng
kernel32
VirtualProtect
UnmapViewOfFile
GetCurrentProcess
MapViewOfFile
GetUserPreferredUILanguages
CreateFileMappingW
GetSystemInfo
HeapSize
SetFilePointerEx
Sleep
GetModuleHandleA
LCMapStringW
CompareStringW
FlsFree
FindFirstFileW
FlsSetValue
FindClose
WideCharToMultiByte
GetStdHandle
GetConsoleMode
FlsGetValue
WaitForSingleObject
FlsAlloc
MultiByteToWideChar
WriteConsoleW
SetLastError
CreateWaitableTimerExW
SetWaitableTimer
QueryPerformanceFrequency
GetModuleHandleW
GetCurrentDirectoryW
WaitForSingleObjectEx
LoadLibraryA
GetCurrentProcessId
CreateMutexA
ReleaseMutex
GetEnvironmentVariableW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetModuleFileNameW
CreateFileW
SetFileInformationByHandle
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFullPathNameW
FindNextFileW
CreateDirectoryW
GetStringTypeW
FormatMessageW
SetHandleInformation
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
TlsFree
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringOrdinal
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
CreateNamedPipeW
CreateThread
SetThreadStackGuarantee
ReadFileEx
SleepEx
WriteFileEx
WaitForMultipleObjects
GetOverlappedResult
GetExitCodeProcess
CreateEventW
CancelIo
ReadFile
ExitProcess
QueryPerformanceCounter
HeapAlloc
GetProcessHeap
SetEnvironmentVariableW
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RaiseException
GetCurrentThreadId
RtlPcToFileHeader
RtlUnwindEx
lstrlenW
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
FlushFileBuffers
GetConsoleOutputCP
InitializeSListHead
GetSystemTimeAsFileTime
LoadLibraryExW
DuplicateHandle
SetThreadErrorMode
GetProcAddress
CloseHandle
GetCurrentThread
GlobalUnlock
MoveFileExW
DeleteFileW
GetCommandLineW
AddVectoredExceptionHandler
AttachConsole
SetConsoleMode
GetLastError
GlobalFree
LoadLibraryExA
GlobalAlloc
GlobalSize
GlobalLock
GetSystemTimePreciseAsFileTime
GetTimeZoneInformationForYear
FreeLibrary
HeapReAlloc
RemoveVectoredExceptionHandler
SwitchToThread
CreateEventA
HeapFree
GetFileType
user32
TrackPopupMenu
SetMenuDefaultItem
EnableMenuItem
CreateWindowExW
RegisterClassExA
DefWindowProcA
CreateWindowExA
OpenClipboard
GetClipboardData
GetSystemMenu
ClientToScreen
GetForegroundWindow
EmptyClipboard
SetClipboardData
RegisterRawInputDevices
MonitorFromPoint
GetMessageW
IsIconic
MapVirtualKeyExW
DispatchMessageW
ToUnicodeEx
CloseClipboard
PostMessageW
ShowWindow
SetWindowLongW
GetWindowLongW
AdjustWindowRectEx
GetClipCursor
ClipCursor
ShowCursor
SystemParametersInfoA
CreateIcon
SendInput
SetForegroundWindow
ChangeDisplaySettingsExW
SetWindowPlacement
RegisterWindowMessageA
ReleaseCapture
GetWindowRect
IsWindowVisible
GetActiveWindow
GetTouchInputInfo
DestroyIcon
IsProcessDPIAware
RegisterClassExW
GetMonitorInfoW
GetAsyncKeyState
GetKeyboardState
SetTimer
GetMenu
KillTimer
RegisterTouchWindow
GetSystemMetrics
GetCursorPos
GetKeyboardLayout
TrackMouseEvent
SetWindowDisplayAffinity
PeekMessageW
MonitorFromWindow
InvalidateRgn
SetWindowPos
SendMessageW
FlashWindowEx
GetClientRect
SetCursor
LoadCursorW
SetWindowTextW
DestroyWindow
MapVirtualKeyW
ValidateRect
GetRawInputData
SetWindowLongPtrW
DefWindowProcW
RedrawWindow
GetKeyState
GetWindowLongPtrW
CloseTouchInputHandle
ScreenToClient
GetDC
ReleaseDC
GetWindowPlacement
MonitorFromRect
SetCapture
TranslateMessage
advapi32
RegOpenKeyExW
ImpersonateAnonymousToken
RevertToSelf
SystemFunction036
RegCloseKey
RegQueryValueExW
shell32
DragQueryFileW
SHCreateItemFromParsingName
SHGetKnownFolderPath
DragFinish
ole32
CoCreateInstance
CoInitializeEx
CoTaskMemFree
OleInitialize
CoUninitialize
RevokeDragDrop
RegisterDragDrop
bcrypt
BCryptGenRandom
gdi32
CreateDIBSection
GetPixelFormat
ChoosePixelFormat
SelectObject
GetDeviceCaps
DescribePixelFormat
SetPixelFormat
SwapBuffers
CreateRectRgn
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
ntdll
RtlNtStatusToDosError
NtWriteFile
NtReadFile
ws2_32
closesocket
WSASocketW
freeaddrinfo
WSACleanup
WSAStartup
WSAGetLastError
getaddrinfo
setsockopt
getpeername
getsockname
WSADuplicateSocketW
ioctlsocket
send
connect
getsockopt
select
recv
WSASend
listen
bind
accept
WSARecv
dwmapi
DwmEnableBlurBehindWindow
imm32
ImmAssociateContextEx
ImmGetCompositionStringW
ImmReleaseContext
ImmGetContext
d3dcompiler_47
D3DCompile
opengl32
wglCreateContext
wglDeleteContext
wglGetCurrentContext
wglMakeCurrent
wglGetProcAddress
oleaut32
SysFreeString
SysStringLen
GetErrorInfo
uxtheme
SetWindowTheme
Sections
.text Size: 8.9MB - Virtual size: 8.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 346KB - Virtual size: 346KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 401KB - Virtual size: 401KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ