Behavioral task
behavioral1
Sample
05fc07586854c332c7496d23a32e13a8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05fc07586854c332c7496d23a32e13a8.exe
Resource
win10v2004-20231222-en
General
-
Target
05fc07586854c332c7496d23a32e13a8
-
Size
55KB
-
MD5
05fc07586854c332c7496d23a32e13a8
-
SHA1
f852e638599c1cc077e9d1e591e639df6305ab44
-
SHA256
e93c2dd614595c202e2a7a969f5773bf5be050b050f08cb5a4c3834369efb354
-
SHA512
51c4535a1fccaf3266e6301754bd2c8997278575cc3287ee8183fe4f56d8d182b20f68b0e64c3b1a22ca3f76e4786d9bfbe002c8453d85e89cd9b418d592046f
-
SSDEEP
384:i51C5CKzHoZLqIRbEwBxRStSc3HBlCZur:iCzmL5S4x8tZlGu
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05fc07586854c332c7496d23a32e13a8
Files
-
05fc07586854c332c7496d23a32e13a8.exe windows:4 windows x86 arch:x86
4574c6da1b9a214f961b367cda47da6a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
HeapAlloc
GetProcessHeap
RtlZeroMemory
GetTickCount
GetModuleHandleA
ExitProcess
HeapFree
user32
MoveWindow
MessageBoxExA
SendMessageA
LoadIconA
GetWindowRect
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
FindWindowA
EndDialog
SendDlgItemMessageA
DialogBoxParamA
Sections
UPX0 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE