Behavioral task
behavioral1
Sample
67747ef82b27ec44ee972883c79ab464.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67747ef82b27ec44ee972883c79ab464.exe
Resource
win10v2004-20231215-en
General
-
Target
67747ef82b27ec44ee972883c79ab464
-
Size
92KB
-
MD5
67747ef82b27ec44ee972883c79ab464
-
SHA1
e6ae9773d9be0d43cbe95d7ff5563d9c99702b0a
-
SHA256
caa6e6affa6c0929f39c949cb7fae38a9db7e3456d590a8742aaed24defce252
-
SHA512
7df837b5d152172e1b6d5c117c090aa78cbd2d8a102988dd7d4ccac216e42dbab0eb62825f1e666a7de7afccc6834dc1a1d759b05e270d56c6327703d8b31963
-
SSDEEP
1536:pI7L1QKTHYihE9QdYoYRcSFVKCh8tC3vAU7oepy9:pA1QKh+QdYoiVKChffAU709
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67747ef82b27ec44ee972883c79ab464
Files
-
67747ef82b27ec44ee972883c79ab464.exe windows:4 windows x86 arch:x86
1bee43e9fd776e5c9815aa175033c83f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
CreateProcessA
DeleteFileA
CreateThread
GetPrivateProfileStringA
MoveFileExA
lstrcpyA
lstrcmpiA
GetWindowsDirectoryA
GetCurrentProcess
GetFileAttributesA
DeviceIoControl
ExitProcess
GetLastError
CreateMutexA
SetFileAttributesA
GetModuleFileNameA
GetCurrentProcessId
TerminateProcess
Process32Next
Sleep
GetSystemDirectoryA
GetTempPathA
GetTickCount
FreeLibrary
LoadLibraryA
GetProcAddress
CreateFileA
WriteFile
lstrcatA
CloseHandle
advapi32
CloseServiceHandle
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenServiceA
OpenSCManagerA
CreateServiceA
StartServiceA
QueryServiceStatus
OpenProcessToken
msvcrt
_stricmp
strrchr
atoi
_itoa
netapi32
Netbios
psapi
GetModuleFileNameExA
EnumProcessModules
shell32
ShellExecuteA
shlwapi
SHDeleteKeyA
user32
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
Sections
UPX0 Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE