Behavioral task
behavioral1
Sample
66f4430d379a2a1e33c364fb408b2428.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66f4430d379a2a1e33c364fb408b2428.exe
Resource
win10v2004-20231215-en
General
-
Target
66f4430d379a2a1e33c364fb408b2428
-
Size
236KB
-
MD5
66f4430d379a2a1e33c364fb408b2428
-
SHA1
e09709e4ec3674543a590b80008ab181f9041c46
-
SHA256
690cc39b3005c89f65037ff494a80f51b27c59a4148d576ea39062d557eff166
-
SHA512
563bfc576cc99a808e25575219a686997bc5c385bef4602f1c11f86e4ed5833a64580d5c736bc573dfedbb715301797a8ba20007a6baef74d64a76f94f375447
-
SSDEEP
3072:V9qhoUwK7S+bGCHKGWCC+N4D+LlBBkednEkYLM8l/0+b68NJj9vsBQOK+T1UTgs4:Hq6KmRFGLCoRdGLvlfhTDT0Q7Z0
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66f4430d379a2a1e33c364fb408b2428
Files
-
66f4430d379a2a1e33c364fb408b2428.exe windows:5 windows x86 arch:x86
7f15603907dd24561265f093e4c76274
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
advapi32
RegCloseKey
comctl32
ord17
comdlg32
GetSaveFileNameA
gdi32
LPtoDP
odbc32
ord57
ole32
CoInitialize
oleaut32
SafeArrayGetUBound
shell32
SHGetMalloc
user32
GetDC
version
VerQueryValueA
Sections
UPX0 Size: - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 201KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rorg Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE