D:\sources\lightshot\DeployingSystem\Updater\bin\1.0.0.0\Updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae69f13999b7dd38e47fe7cadf83a3de1e22ec1af69ef6e00386faacb5f2fe39N.exe
Resource
win7-20240903-en
General
-
Target
ae69f13999b7dd38e47fe7cadf83a3de1e22ec1af69ef6e00386faacb5f2fe39N
-
Size
1.4MB
-
MD5
904fdace4a29f8bcfb418802c518f3a0
-
SHA1
4ee6553d029a73848f19bcd0bae49da5b1144ef7
-
SHA256
ae69f13999b7dd38e47fe7cadf83a3de1e22ec1af69ef6e00386faacb5f2fe39
-
SHA512
133622ea658755a3351e9bb64e996afe09518fd6a2994896e751f8c28622ef82833d0c9aa46a0216a56d67e4558dfa10f4264fc89c35f5afb34f47d001b292f5
-
SSDEEP
24576:3qfz6nVuOJTtkPxeJ8kdJE1XM3h4qXy8IsqjnhMgeiCl7G0nehbGZpbD:OzypXZzB3htC80Dmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae69f13999b7dd38e47fe7cadf83a3de1e22ec1af69ef6e00386faacb5f2fe39N
Files
-
ae69f13999b7dd38e47fe7cadf83a3de1e22ec1af69ef6e00386faacb5f2fe39N.exe windows:5 windows x86 arch:x86
6c0552d294568c9d955df768391ff0c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryExW
GetModuleFileNameW
GetModuleHandleW
OpenProcess
TerminateProcess
SetLastError
WriteFile
FindClose
LoadLibraryW
CreateProcessW
GetTempPathW
RemoveDirectoryW
CreateFileW
GetFileAttributesW
FindFirstFileW
CreateMutexW
WTSGetActiveConsoleSessionId
ReadFile
GetSystemTime
SystemTimeToTzSpecificLocalTime
GetCurrentProcess
GetVersionExW
WriteConsoleW
FlushFileBuffers
GetTickCount
WaitForMultipleObjectsEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
FindNextFileW
lstrcmpiW
CloseHandle
Sleep
WaitForSingleObject
ReleaseMutex
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
GetProcAddress
FreeLibrary
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
DeleteFileW
FindResourceExW
FindResourceW
SizeofResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LockResource
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleCP
FatalAppExitA
SetConsoleCtrlHandler
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetStringTypeW
GetFileType
SetEndOfFile
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetCPInfo
GetOEMCP
GetACP
SetStdHandle
DecodePointer
IsValidCodePage
SetProcessAffinityMask
VirtualProtect
VirtualFree
VirtualAlloc
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetStdHandle
AreFileApisANSI
IsDebuggerPresent
OutputDebugStringW
GetSystemTimeAsFileTime
DuplicateHandle
GetCurrentThread
GetExitCodeThread
EncodePointer
RtlUnwind
TryEnterCriticalSection
CreateTimerQueue
IsProcessorFeaturePresent
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlCaptureStackBackTrace
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateEventW
GetStartupInfoW
CreateSemaphoreW
ExitThread
ExitProcess
GetModuleHandleExW
user32
DestroyWindow
DefWindowProcW
GetSystemMetrics
UnregisterClassW
CharNextW
GetWindowLongW
SetWindowLongW
GetWindowDC
gdi32
GetDeviceCaps
advapi32
CryptReleaseContext
RegOpenKeyW
RegEnumValueW
RegEnumKeyW
GetSidSubAuthorityCount
GetSidSubAuthority
GetSidIdentifierAuthority
IsValidSid
GetTokenInformation
OpenProcessToken
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
RegCloseKey
CryptAcquireContextW
CheckTokenMembership
CreateProcessAsUserW
GetUserNameW
FreeSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
shell32
SHGetFolderPathW
ole32
CoTaskMemRealloc
CoCreateInstance
StringFromCLSID
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
oleaut32
SysFreeString
VarUI4FromStr
shlwapi
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
PathCanonicalizeW
PathAddBackslashW
comctl32
InitCommonControlsEx
psapi
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
wtsapi32
WTSQueryUserToken
rpcrt4
UuidCreate
urlmon
URLDownloadToFileW
URLOpenBlockingStreamW
wininet
DeleteUrlCacheEntryW
Sections
.text Size: 641KB - Virtual size: 640KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE