Ip
Behavioral task
behavioral1
Sample
f7964ecf9f98c8529791af13329862fd.exe
Resource
win7-20231215-en
General
-
Target
f7964ecf9f98c8529791af13329862fd
-
Size
829KB
-
MD5
f7964ecf9f98c8529791af13329862fd
-
SHA1
7972b3d56bfecdaadb0492a2fbf5376a8e4373af
-
SHA256
e990b447034d1ad87c4454b01cb9618808a221c1da1b4ba25a7265ead8cbd1e5
-
SHA512
664bbe19d2e310ca41b8414a60367793938c21e78a68889e43f65483d114e46d76818ba2e3c420156390ddbdf50bd59fdf521d65ad6697e1b4c8da3778337d4c
-
SSDEEP
12288:b/Q3s4LEteM9JzZsi+s6vF0/P8jI0M2AxqbtYofs0AfxKK7pea6x+2IxhTEmMnR2:jQ3lweMzv6vFxjI0MsZoX002UT32m22
Malware Config
Signatures
-
resource yara_rule sample upx -
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7964ecf9f98c8529791af13329862fd
Files
-
f7964ecf9f98c8529791af13329862fd.exe windows:5 windows x86 arch:x86
0e615c1a8ec002d56eff71ddd90b732f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreatePen
kernel32
GetCommandLineA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
mfc42
ord4159
msvcrt
exit
user32
CharUpperBuffW
winmm
PlaySoundA
Exports
Exports
Sections
UPX0 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 570KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 639KB - Virtual size: 639KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE