Behavioral task
behavioral1
Sample
f9bcc4738d935ea2c090ea31e2347b73.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f9bcc4738d935ea2c090ea31e2347b73.exe
Resource
win10v2004-20231215-en
General
-
Target
f9bcc4738d935ea2c090ea31e2347b73
-
Size
339KB
-
MD5
f9bcc4738d935ea2c090ea31e2347b73
-
SHA1
7755862d43fbb682905ba9a0f3123abe6da87481
-
SHA256
20b01a77bd0ae5e98d9a4b9f4ac6f1d12fa2ad093653ce5c0cc95604aa9462f3
-
SHA512
ccda1df76235562a67892e4d2464f4ee519ef431d2ff6ee20bc81220a146fe4715a659772bf55dd18795b78845c0f1ec58cb8b8b5e38cbb396cd373e7dec6833
-
SSDEEP
6144:uWIju5666kWFfhbdzK1xRarDHW+ElO4HinhMBLwiw0YrEe4UFJi:Zj5mLpA1xRarDHf4Cno9YAe3Ji
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9bcc4738d935ea2c090ea31e2347b73
Files
-
f9bcc4738d935ea2c090ea31e2347b73.exe windows:5 windows x86 arch:x86
3434b6ba62754012170050ed515ab846
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdA
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceRegistryPropertyA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
FreeLibrary
ExpandEnvironmentStringsA
Sleep
GetFileAttributesA
GetLastError
GetProcAddress
GetLocalTime
LoadLibraryExA
GetVersionExA
GetModuleFileNameA
GetSystemWindowsDirectoryA
GetTickCount
CreateFileA
LoadLibraryA
CloseHandle
GetWindowsDirectoryA
WriteFile
HeapSize
FlushFileBuffers
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
WriteConsoleW
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
SetEnvironmentVariableA
OutputDebugStringA
GetACP
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
WideCharToMultiByte
GetTimeZoneInformation
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
RtlUnwind
RaiseException
ReadFile
SetFilePointer
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetStringTypeW
user32
wsprintfA
wsprintfW
comdlg32
GetSaveFileNameA
CommDlgExtendedError
advapi32
RegCloseKey
OpenSCManagerA
QueryServiceStatus
RegOpenKeyExA
RegQueryValueExA
CloseServiceHandle
OpenServiceA
RegOpenKeyA
shell32
SHGetFolderPathA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE