upgrade.exe
- File Path:
C:\Program Files (x86)\Glary Utilities 5\upgrade.exe
- Description: Glary Utilities Upgrade
Hashes
Type | Hash |
---|---|
MD5 | 798242794D23FDFF13B482C5D20AF566 |
SHA1 | B579ABB462609D27AF5179101668DBDCC9B9747D |
SHA256 | 5619BFF1CA4B89340A4CB40596257EBAFC79605FCD864A391CC5BE9B4F3216B0 |
SHA384 | 0875086E31A586EB0A6DA4D7F8A8B1B868A0A2351937D3607CF0E138EF1599A4FC67603B279A71A0659FB7B370373955 |
SHA512 | 752A160C826099252BA55DEEC90FE0A58BA1C2F0EFEB3A8A6A9A815EBF9BE60D330E305A538876A18144BBA698B5C39E71A0282A49CA08B7B6A5CDC7D44C57E9 |
SSDEEP | 1536:oJMyihOOXd78vyBxF1pnOS8zORuCpeyK5jREdxOSOxiebVHxUfc:oJMyihOOXd7SyBxF1pnOSQORu4ezUxOp |
IMP | C86E4545EC619A9589CB00E12FAC7A3B |
PESHA1 | 155128C1C84B0E75AD10627E4D742F749514FE5D |
PE256 | 97E31FB4B9E36423209D5EE0B0A7196636282E00ED1EC99F3E2C12480207D0D0 |
Runtime Data
Loaded Modules:
Path |
---|
C:\Program Files (x86)\Glary Utilities 5\upgrade.exe |
C:\Windows\SYSTEM32\ntdll.dll |
C:\Windows\System32\wow64.dll |
C:\Windows\System32\wow64cpu.dll |
C:\Windows\System32\wow64win.dll |
Signature
- Status: Signature verified.
- Serial:
0F05AE21CDC17B9F3CF09D7BFC659BA3
- Thumbprint:
362EBB303E088105BDCC07D94E6B7875D30C0D06
- Issuer: CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US
- Subject: CN=Glarysoft LTD, O=Glarysoft LTD, S=Beijing, C=CN
File Metadata
- Original Filename: upgrade.exe
- Product Name: Glary Utilities
- Company Name: Glarysoft Ltd
- File Version: 5.0.0.12
- Product Version: 5.0.0.12
- Language: English
- Legal Copyright: Copyright (c) 2003-2020 Glarysoft Ltd
- Machine Type: 32-bit
File Scan
- VirusTotal Detections: 0/71
- VirusTotal Link: https://www.virustotal.com/gui/file/5619bff1ca4b89340a4cb40596257ebafc79605fcd864a391cc5be9b4f3216b0/detection/
File Similarity (ssdeep match)
File | Score |
---|---|
C:\program files (x86)\Glary Utilities 5\upgrade.exe | 94 |
C:\Program Files (x86)\Glary Utilities 5\upgrade.exe | 94 |
Possible Misuse
The following table contains possible examples of upgrade.exe
being misused. While upgrade.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | sigma-test.yml | python -m pip install --upgrade pip |
DRL 1.0 |
sigma | proc_creation_win_service_stop.yml | - Administrator shutting down the service due to upgrade or removal purposes |
DRL 1.0 |
malware-ioc | adjectives.txt | upgrade |
© ESET 2014-2018 |
malware-ioc | nightscout | http://cdn.cloudfronter[.]com/player/upgrade/ext/20201030/1/35e3797508c555d5f5e19f721cf94700.exe |
© ESET 2014-2018 |
malware-ioc | nightscout | http://cdn.cloudfronter[.]com/player/upgrade/ext/20201101/1/bf571cb46afc144cab53bf940da88fe2.exe |
© ESET 2014-2018 |
malware-ioc | nightscout | http://cdn.cloudfronter[.]com/player/upgrade/ext/20201123/1/2ca0a5f57ada25657552b384cf33c5ec.exe |
© ESET 2014-2018 |
malware-ioc | nightscout | http://cdn.cloudfronter[.]com/player/upgrade/ext/20201225/7c21bb4e5c767da80ab1271d84cc026d.exe |
© ESET 2014-2018 |
malware-ioc | nightscout | http://cdn.cloudfronter[.]com/player/upgrade/ext/20210119/842497c20072fc9b92f2b18e1d690103.exe |
© ESET 2014-2018 |
malware-ioc | nightscout | https://cdn.cloudfronte[.]com/player/upgrade/ext/20201020/1/c697ad8c21ce7aca0a98e6bbd1b81dff.exe |
© ESET 2014-2018 |
malware-ioc | nightscout | http://cdn.cloudfronte[.]com/player/upgrade/ext/20201030/1/35e3797508c555d5f5e19f721cf94700.exe |
© ESET 2014-2018 |
malware-ioc | nightscout | http://res06.bignox[.]com/player/upgrade/202009/6c99c19d6da741af943a35016bb05b35.exe |
© ESET 2014-2018 |
malware-ioc | nightscout | http://res06.bignox[.]com/player/upgrade/202009/42af40f99512443cbee03d090658da64.exe |
© ESET 2014-2018 |
malware-ioc | rakos.yar | $ = "upgrade/vars.yaml" |
© ESET 2014-2018 |
malware-ioc | vf_ioc_linux_rakos.py | $ = "upgrade/vars.yaml" |
© ESET 2014-2018 |
signature-base | apt_vpnfilter.yar | $x3 = “Please upgrade! This version of Tor (%s) is %s, according to the directory authorities. Recommended versions are: %s” fullword ascii | CC BY-NC 4.0 |
signature-base | crime_mirai.yar | $s2 = “loadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>” fullword ascii | CC BY-NC 4.0 |
signature-base | yara_mixed_ext_vars.yar | $s2 = “Virtual hardware upgrade helper service” fullword wide | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.