WindowsAnytimeUpgradeResults.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4ded715393be7bf117b12abb12c4374143c60e1ac3ba20f9674b5391c0ab7b97N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ded715393be7bf117b12abb12c4374143c60e1ac3ba20f9674b5391c0ab7b97N.exe
Resource
win10v2004-20240802-en
General
-
Target
4ded715393be7bf117b12abb12c4374143c60e1ac3ba20f9674b5391c0ab7b97N
-
Size
306KB
-
MD5
8eca62433c2e1fe0d01b83b4fc7d0270
-
SHA1
a60e9329443e524da6e2ae60340eda5bd4b2e5db
-
SHA256
4ded715393be7bf117b12abb12c4374143c60e1ac3ba20f9674b5391c0ab7b97
-
SHA512
0790adbfe5449552dba602e62379300c483be338a7a7349c853a067842358adf10c4035c34ce688a7c88b7dce4de8f9c05502b0624c3ad77d6a93bcc4b433de2
-
SSDEEP
6144:dVt7h51Nq/DEM7vpUWolNwBFz8bEJoP6iR3WlQ60yV/:l7T/qIqpElEw4YVRLxI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ded715393be7bf117b12abb12c4374143c60e1ac3ba20f9674b5391c0ab7b97N
Files
-
4ded715393be7bf117b12abb12c4374143c60e1ac3ba20f9674b5391c0ab7b97N.exe windows:6 windows x86 arch:x86
df8245b0ae8c055f400cea6a1dd931f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
kernel32
GetProductInfo
GetSystemTime
SystemTimeToFileTime
CreateEventW
Sleep
InterlockedExchange
HeapAlloc
GetProcessHeap
MultiByteToWideChar
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GlobalFree
GetLocalTime
CreateFileW
CreateDirectoryW
GetVersionExW
WideCharToMultiByte
lstrlenA
WriteFile
CloseHandle
SetLastError
MulDiv
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
LocalFree
FreeLibrary
InterlockedCompareExchange
LoadLibraryExW
lstrcmpiW
ExpandEnvironmentStringsW
GetLastError
GetTickCount
LoadLibraryW
GetUserDefaultUILanguage
SetFilePointer
GetProcAddress
gdi32
GetDeviceCaps
DeleteObject
user32
SetForegroundWindow
FindWindowW
LoadStringW
SystemParametersInfoW
DispatchMessageW
CallWindowProcW
GetMessageW
AllowSetForegroundWindow
SetProcessDPIAware
PostQuitMessage
LoadImageW
PostMessageW
LoadIconW
SetWindowLongW
ShowWindow
TranslateMessage
GetWindowPlacement
GetDC
IsProcessDPIAware
SendMessageW
ReleaseDC
msvcrt
_purecall
??2@YAPAXI@Z
_vsnwprintf
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
memset
_initterm
_amsg_exit
??3@YAXPAX@Z
__setusermatherr
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_acmdln
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
SysAllocString
shell32
ShellExecuteW
ShellExecuteExW
uxtheme
SetWindowThemeAttribute
dui70
?GetEnabled@Element@DirectUI@@QAE_NXZ
?FireEvent@Element@DirectUI@@QAEXPAUEvent@2@_N1@Z
?KeyboardNavigate@Element@DirectUI@@SG?AVUID@@XZ
?SetSelected@Element@DirectUI@@QAEJ_N@Z
?CreateGraphic@Value@DirectUI@@SGPAV12@PAUHICON__@@_N11@Z
?CreateGraphic@Value@DirectUI@@SGPAV12@PAUHBITMAP__@@EI_N11@Z
?ContentProp@Element@DirectUI@@SGPBUPropertyInfo@2@XZ
?SetValue@Element@DirectUI@@QAEJP6GPBUPropertyInfo@2@XZHPAVValue@2@@Z
?Release@Value@DirectUI@@QAEXXZ
?SetAccName@Element@DirectUI@@QAEJPBG@Z
?GetContentString@Element@DirectUI@@QAEPBGPAPAVValue@2@@Z
?RemoveListener@Element@DirectUI@@QAEXPAUIElementListener@2@@Z
?Remove@Element@DirectUI@@QAEJPAV12@@Z
??1NativeHWNDHost@DirectUI@@UAE@XZ
?DestroyWindow@NativeHWNDHost@DirectUI@@QAEXXZ
?OnMessage@NativeHWNDHost@DirectUI@@UAEJIIJPAJ@Z
?StartDefer@Element@DirectUI@@QAEXPAK@Z
?SetEnabled@Element@DirectUI@@QAEJ_N@Z
?Destroy@Element@DirectUI@@QAEJ_N@Z
?GetID@Element@DirectUI@@QAEGXZ
?Click@Button@DirectUI@@SG?AVUID@@XZ
??0NativeHWNDHost@DirectUI@@QAE@XZ
InitThread
UnInitThread
?Initialize@NativeHWNDHost@DirectUI@@QAEJPBG0PAUHWND__@@PAUHICON__@@HHHHHHPAUHINSTANCE__@@I@Z
?Destroy@NativeHWNDHost@DirectUI@@QAEXXZ
?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ
UnInitProcessPriv
InitProcessPriv
?Create@HWNDElement@DirectUI@@SGJPAUHWND__@@_NIPAVElement@2@PAKPAPAV42@@Z
?Host@NativeHWNDHost@DirectUI@@QAEXPAVElement@2@@Z
?Create@BorderLayout@DirectUI@@SGJPAPAVLayout@2@@Z
?SetLayout@Element@DirectUI@@QAEJPAVLayout@2@@Z
?SetVisible@Element@DirectUI@@QAEJ_N@Z
?SetAccessible@Element@DirectUI@@QAEJ_N@Z
??0DUIFactory@DirectUI@@QAE@PAUHWND__@@@Z
?LoadFromResource@DUIFactory@DirectUI@@QAEJPAUHINSTANCE__@@PBG1PAVElement@2@PAKPAPAV42@1@Z
??1DUIFactory@DirectUI@@QAE@XZ
?Add@Element@DirectUI@@QAEJPAV12@@Z
StrToID
?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z
?SetContentString@Element@DirectUI@@QAEJPBG@Z
?AddListener@Element@DirectUI@@QAEJPAUIElementListener@2@@Z
?EndDefer@Element@DirectUI@@QAEXK@Z
?ShowWindow@NativeHWNDHost@DirectUI@@QAEXH@Z
winbrand
BrandingLoadString
BrandingFormatString
BrandingLoadImage
ntdll
WinSqmSetDWORD
WinSqmIsOptedIn
WinSqmStartSession
WinSqmAddToStream
WinSqmEndSession
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE