Behavioral task
behavioral1
Sample
078fd150cdd21a4fc7bb91586de7b42a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
078fd150cdd21a4fc7bb91586de7b42a.exe
Resource
win10v2004-20231222-en
General
-
Target
078fd150cdd21a4fc7bb91586de7b42a
-
Size
270KB
-
MD5
078fd150cdd21a4fc7bb91586de7b42a
-
SHA1
998bc548043e90fb05ef10a9136591f733d37882
-
SHA256
871a0d4caa6610036b90270e328830a7063df68ab946552d865f55800773ea34
-
SHA512
5ccbc2c80aba39bf6ad6613836db07ba8f9e8f635c2ea0dc8fbeb472d1baef233b0c2e492038bb55f7bfbfef0059831712eea39baa1fa7977e399081c911692a
-
SSDEEP
6144:Oo4NTTsuJ9fTl6gZS/Rf7pZjDdd0Uu6gwS7xBH28Bj:p4NfsuJSdhdd0Uu6gw2BH5Bj
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 078fd150cdd21a4fc7bb91586de7b42a
Files
-
078fd150cdd21a4fc7bb91586de7b42a.exe windows:4 windows x86 arch:x86
c6400dced7b74aaa9f5a124498168dd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
NdrServerCall2
RpcServerRegisterAuthInfoA
RpcServerUseProtseqEpA
RpcServerRegisterIf
RpcMgmtStopServerListening
RpcServerUnregisterIf
RpcServerInqBindings
RpcBindingVectorFree
RpcServerListen
kernel32
InitializeCriticalSection
GetSystemInfo
WaitForSingleObject
GetVersionExA
CreateEventA
SetEvent
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleHandleA
GetCurrentProcess
TlsAlloc
GetLastError
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentStringsW
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetProcessHeap
GetProcAddress
advapi32
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
scecli
SceStartTransaction
SceSetupUnwindSecurityFile
SceUpdateSecurityProfile
SceFreeProfileMemory
SceSetupUpdateSecurityKey
SceOpenPolicy
SceSvcSetInformationTemplate
ieaksie
DllRegisterServer
Sections
UPX1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kko Size: 3KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gFV Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ZVm Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jzyAY Size: 3KB - Virtual size: 487KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 101KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IEce Size: 5KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Ir Size: 3KB - Virtual size: 629KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 120KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ