Behavioral task
behavioral1
Sample
is153219.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
is153219.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
patch.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
patch.exe
Resource
win10v2004-20231215-en
General
-
Target
48da323a8be2580d9769637a9b32bde7
-
Size
324KB
-
MD5
48da323a8be2580d9769637a9b32bde7
-
SHA1
ca135e467fcc651cece5b22a10c4f58d1ae79d87
-
SHA256
7c642080c1e69e771fd0400901063bb44f6ca8131ddccea403865b31d61dbddc
-
SHA512
a9fcd20a036f27f8ed9dcc802b1634ff286971a5a9abcf4f9fb77a22b1195ca222991450f1d6cd21683e2bf98cf29f668d97a37f62b165bfd624f99795d3737c
-
SSDEEP
6144:5/K58qCODjND3xPl9RPf70hBGkURZEunVpj///LPnLl4Eor/lcjU:xK5vlPNDP9RPj0DGkctVLlhUcI
Malware Config
Signatures
-
resource yara_rule static1/unpack001/patch.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/is153219.exe unpack001/patch.exe unpack002/out.upx
Files
-
48da323a8be2580d9769637a9b32bde7.cab
-
is153219.exe.exe windows:4 windows x86 arch:x86
d0cd0238cd5f7a897b30cc17356f5f1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ToAscii
ShowWindow
ShowCursor
SetFocus
SetCursor
OemToCharBuffA
IsCharUpperA
GetMessageA
GetFocus
GetDlgItem
EndDeferWindowPos
EnableWindow
DrawTextA
DialogBoxParamA
DestroyCaret
DeleteMenu
CreateIconFromResourceEx
CreateIcon
CreateDesktopA
CopyImage
CharPrevA
ActivateKeyboardLayout
kernel32
lstrcmpiA
EnumResourceTypesA
ExitThread
FlushFileBuffers
GetLastError
GetStartupInfoA
OpenFileMappingA
RtlUnwind
lstrcpynA
EnumResourceLanguagesW
VirtualAlloc
TlsAlloc
oleaut32
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayCreate
SysReAllocString
VarBstrCat
GetErrorInfo
VarBstrCmp
Sections
.text Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
patch.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 328KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 279KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 452KB - Virtual size: 449KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ