Behavioral task
behavioral1
Sample
649a0a2ca5af24bac63781ca3e509b3b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
649a0a2ca5af24bac63781ca3e509b3b.exe
Resource
win10v2004-20231215-en
General
-
Target
649a0a2ca5af24bac63781ca3e509b3b
-
Size
7KB
-
MD5
649a0a2ca5af24bac63781ca3e509b3b
-
SHA1
e066e442d107313819cf143eeae5bb5728969521
-
SHA256
84271a575da59802205045dd28cafb9254f29edddd204901800487d704101185
-
SHA512
13f6b205470db513a73e4377d71b29c46b5216ac4ff38bc1d751dd5a4c1491be8fb277f2e50df7f3b791ae7506b658e7fefcfd74af719b0fb014985665fe7a96
-
SSDEEP
192:p34KFMNLua7dEkxnJbPsKd8INjWRG1l7:lyNLDdEAJxfN6RI
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 649a0a2ca5af24bac63781ca3e509b3b
Files
-
649a0a2ca5af24bac63781ca3e509b3b.exe windows:4 windows x86 arch:x86
60180305da1b391f4fc2af5784ddd919
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TransactNamedPipe
GetMailslotInfo
GetConsoleMode
SetFileApisToOEM
VDMConsoleOperation
lstrcatA
gdi32
UpdateICMRegKeyA
SetViewportExtEx
OffsetWindowOrgEx
CreateColorSpaceA
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE