Static task
static1
Behavioral task
behavioral1
Sample
UWPSpy.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
UWPSpy.exe
Resource
win10v2004-20240802-en
General
-
Target
UWPSpy.exe
-
Size
259KB
-
MD5
bedac9fded2ffd6002bb6f362945a332
-
SHA1
c4abd5f4131b62c9dfb3abff13a3def82dfd513f
-
SHA256
3ded89f62779bab65fe195e2c120d143bbad1dcfe91d8167a0a93ea0ecf31f04
-
SHA512
41af5b1ef07aed5947c4520081c93f3736f2dd27b93bedaacc8e0c00caf18f036f0dd959f3fa622f177c4f64b1ea33f794cd64d1c06baa766aa18d8a69471d41
-
SSDEEP
3072:kP+uS7/qitLmgmdmh+SH0G+LP5UNG1bbW5K2SHpTYiYtRgfPSfA/8A+8TK0Uq:A2/tSgwmh+SN+z5RbC6Y3gnh0A+4hH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource UWPSpy.exe
Files
-
UWPSpy.exe.exe windows:6 windows x64 arch:x64
Password: upw
76543b7edeae401edc41d9e3b9e40aaa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shlwapi
PathFindFileNameW
kernel32
LocalFree
GetModuleFileNameW
GetFileAttributesW
FormatMessageW
InitializeCriticalSectionEx
GetLastError
DecodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
LoadLibraryExW
RaiseException
GetCurrentThreadId
SetLastError
CreateFileW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetStringTypeW
SetStdHandle
LCMapStringW
CloseHandle
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
FreeEnvironmentStringsW
LoadResource
WideCharToMultiByte
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
GetCommandLineW
GetCommandLineA
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlPcToFileHeader
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MulDiv
GetProcAddress
FindResourceExW
FindResourceW
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
lstrcmpW
lstrcmpiW
GetModuleHandleW
RtlUnwindEx
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
LoadLibraryExA
LoadLibraryW
FreeLibrary
WriteConsoleW
GetEnvironmentStringsW
VirtualFree
VirtualAlloc
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
user32
GetSysColor
ReleaseDC
GetDesktopWindow
SendMessageW
FillRect
GetSysColorBrush
GetDC
GetWindowLongPtrW
InvalidateRect
IsWindowVisible
ShowWindow
DefWindowProcW
DialogBoxParamW
DestroyIcon
GetActiveWindow
CharNextW
GetDlgCtrlID
UnregisterClassW
SetWindowLongPtrW
EndDialog
CreateWindowExW
DestroyWindow
IsWindow
SetWindowLongW
SetTimer
IsDlgButtonChecked
RedrawWindow
GetSystemMetrics
GetDlgItem
GetWindowThreadProcessId
WindowFromPoint
GetCursorPos
KillTimer
CheckDlgButton
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetClientRect
MapWindowPoints
SetWindowPos
MessageBoxW
LoadCursorW
CallWindowProcW
SetCursor
GetParent
LoadImageW
gdi32
CreateCompatibleBitmap
DeleteObject
CreatePen
Polygon
SelectObject
DeleteDC
CreateCompatibleDC
advapi32
RegSetValueExW
GetSecurityDescriptorDacl
SetNamedSecurityInfoW
RegDeleteKeyW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteW
ole32
CoCreateInstance
CoTaskMemRealloc
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VarDateFromStr
VarDecCmp
VarUI4FromStr
VarI4FromStr
VarR8FromStr
VarDecFromStr
comctl32
InitCommonControlsEx
ord380
ord345
uxtheme
SetWindowTheme
Sections
.text Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ