Behavioral task
behavioral1
Sample
012935a50434c35eb7b739c308f30598.exe
Resource
win7-20231215-en
General
-
Target
012935a50434c35eb7b739c308f30598
-
Size
52KB
-
MD5
012935a50434c35eb7b739c308f30598
-
SHA1
55f77dfa017ef0627b3d69ed6d3fe0eb07560fae
-
SHA256
21373f2335b00abb8e721718610122303f2d4a7466cee5c2f0169e764d106e3d
-
SHA512
616e0fb374a6fbd1b9f8d8a0a8e2fc10457c958f2745cdf1fb9ab8b818224ac79a8df3ac7d615d17b37ebd4f6dd302a2a588011e7acee63fa586fb2e53252b87
-
SSDEEP
1536:lao1MQaTQmgWslieYgnKd969jBRbfOP0PO6V:lanQaTQmgvhK/cJOOO4
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 012935a50434c35eb7b739c308f30598
Files
-
012935a50434c35eb7b739c308f30598.exe windows:4 windows x86 arch:x86
91834a0af34517a83b13f67eb7c438ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
MkParseDisplayNameEx
FindMediaType
WriteHitLogging
CreateURLMoniker
kernel32
CreateNamedPipeW
DisconnectNamedPipe
ExpandEnvironmentStringsW
EnumDateFormatsExW
ExpandEnvironmentStringsW
FindNextFileW
Sections
UPX0 Size: - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE