Static task
static1
Behavioral task
behavioral1
Sample
y.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
y.exe
Resource
win10-20231023-en
General
-
Target
y.exe
-
Size
516KB
-
MD5
672c56bcaeedb4f630cda204ed5ef32d
-
SHA1
df8868926293efb2e13339a020a0eefee128d9d7
-
SHA256
448a9d8451178d090723b249ba1b3514539b14bfb14a7b2141dd492f296d1f53
-
SHA512
38f69f8199a664edb278aeb63d33a50d19fa843e1331ba3870f3038cd2620cd41979c02287dfe154031c1d5ea32be70d9f775ae2e2f8c4f8e7fbef36154b21a4
-
SSDEEP
6144:J0aJ41z7pmJyseEgKgPObyIozhRjcerTn:J0aqz79QmI4T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource y.exe
Files
-
y.exe.exe windows:4 windows x86
a606d6d193682c88456990bb5b2cb89a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetOEMCP
Sleep
GetStringTypeA
GetStringTypeW
ReadFile
LCMapStringA
LCMapStringW
SetStdHandle
SetFilePointer
FlushFileBuffers
CloseHandle
lstrlenA
LocalFree
lstrcpynA
LocalAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GetCPInfo
GlobalAlloc
LocalReAlloc
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
GetProcessVersion
lstrcmpA
GlobalFlags
InterlockedExchange
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
RaiseException
GetProcessHeap
IsBadReadPtr
FreeLibrary
LoadLibraryA
GlobalReAlloc
GetProcAddress
user32
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
SetWindowTextA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
DestroyMenu
TabbedTextOutA
GrayStringA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
DefWindowProcA
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
EndPaint
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
GetCapture
GetDlgItem
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
WinHelpA
CheckMenuItem
comctl32
ord17
gdi32
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
CreateBitmap
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 352KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ