Behavioral task
behavioral1
Sample
db1b3c7c6b5e6dbcd43aa50898ccafe15cf669b483d95c2ec898adc43f2f9e29.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
db1b3c7c6b5e6dbcd43aa50898ccafe15cf669b483d95c2ec898adc43f2f9e29.exe
Resource
win10v2004-20230220-en
General
-
Target
db1b3c7c6b5e6dbcd43aa50898ccafe15cf669b483d95c2ec898adc43f2f9e29
-
Size
4.1MB
-
MD5
93c7f5b83bdfc6a97b5f2be673b5a364
-
SHA1
4ad287b8ce39a4cdfa62b2cadb0c44fc0557e849
-
SHA256
db1b3c7c6b5e6dbcd43aa50898ccafe15cf669b483d95c2ec898adc43f2f9e29
-
SHA512
75f9d550f768f72d02f46aa301ce695735aa0b819e1a25b52f3757b4c0f736500aa4917ec237f0a190104021327967f56a7a85f1f0885a280105a3b687b0277e
-
SSDEEP
98304:eBtGG+VZ0QxrBXmlt797JIgrGbeT+VWG3Gt2:eBt2i+m379CgrgVWKGt
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db1b3c7c6b5e6dbcd43aa50898ccafe15cf669b483d95c2ec898adc43f2f9e29
Files
-
db1b3c7c6b5e6dbcd43aa50898ccafe15cf669b483d95c2ec898adc43f2f9e29.exe windows x86
9201f06462456f288d96d1ad96768d95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
advapi32
RegCloseKey
user32
RegisterClassA
kernel32
GetVersionExA
GetVersion
GetVersionExA
Sleep
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
gdi32
RestoreDC
version
VerQueryValueA
mpr
WNetGetConnectionA
ole32
CLSIDFromString
comctl32
ImageList_Destroy
imm32
ImmGetContext
wininet
InternetCrackUrlA
shell32
ShellExecuteA
comdlg32
GetOpenFileNameA
winmm
timeGetTime
d3d9
Direct3DCreate9
msvcrt
iscntrl
d3dx9_43
D3DXSaveSurfaceToFileA
ws2_32
WSAEnumNetworkEvents
ntdll
RtlNtStatusToDosError
Sections
.text Size: - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 648KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 84B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ