BraveUpdateComRegisterShell64_unsigned.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7a37f08852825aad2d17d770bee7fa76266df870edf02a9a8c1a3fffa4055e49N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7a37f08852825aad2d17d770bee7fa76266df870edf02a9a8c1a3fffa4055e49N.exe
Resource
win10v2004-20240802-en
General
-
Target
7a37f08852825aad2d17d770bee7fa76266df870edf02a9a8c1a3fffa4055e49N
-
Size
1.3MB
-
MD5
f1b9526e8c3b18b00763f29cfe052730
-
SHA1
3e3bff680634684a6f620c2bc081eb9032ab264f
-
SHA256
7a37f08852825aad2d17d770bee7fa76266df870edf02a9a8c1a3fffa4055e49
-
SHA512
fc7bab5185b2336ac4aac4086e37ed4273c60b5bae687de99cf95448013b240934f9de6ba159d914409ac4c9512cbfd005a76ff9295c0875413f7ee43ec7c650
-
SSDEEP
24576:TcHrjB33gFo6vqwkZncAwCzRZBsysQuG961E:Tmp3H6yvVcAwCzhsyvuPE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a37f08852825aad2d17d770bee7fa76266df870edf02a9a8c1a3fffa4055e49N
Files
-
7a37f08852825aad2d17d770bee7fa76266df870edf02a9a8c1a3fffa4055e49N.exe windows:5 windows x64 arch:x64
4f32214340f08cb2ab89522936793048
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegOverridePredefKey
RegOpenKeyExW
RegQueryValueExW
kernel32
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
SetFilePointerEx
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
FindResourceW
SizeofResource
LockResource
LoadResource
GetProcAddress
GetModuleHandleW
FindResourceExW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
DecodePointer
GetCommandLineW
GetModuleHandleExW
GetModuleFileNameW
GetEnvironmentVariableW
CloseHandle
GetCurrentProcessId
VirtualQuery
LocalFree
SetLastError
FindNextFileW
GetCurrentProcess
FindClose
GetFileAttributesExW
LoadLibraryW
FreeLibrary
lstrcmpiW
GetTickCount
LoadLibraryExW
TerminateProcess
Sleep
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
CreateFileW
GetSystemTimeAsFileTime
FlushFileBuffers
GetPrivateProfileIntW
OutputDebugStringA
GetCurrentThreadId
OutputDebugStringW
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
ExitProcess
IsDebuggerPresent
GetStdHandle
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
GetStartupInfoW
InitializeCriticalSectionEx
EncodePointer
GetStringTypeW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
wsprintfW
MessageBoxW
EmptyClipboard
CloseClipboard
OpenClipboard
SetClipboardData
CharLowerBuffW
shlwapi
PathStripPathW
PathRemoveExtensionW
PathRemoveFileSpecW
PathAppendW
shell32
CommandLineToArgvW
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE