Behavioral task
behavioral1
Sample
1fe42a9ea6f4ea977a1bdb272081b702.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1fe42a9ea6f4ea977a1bdb272081b702.exe
Resource
win10v2004-20231215-en
General
-
Target
1fe42a9ea6f4ea977a1bdb272081b702
-
Size
1.3MB
-
MD5
1fe42a9ea6f4ea977a1bdb272081b702
-
SHA1
c0b829531780b2f049f20e384ec2914e68f3f2b2
-
SHA256
cc4d68461ccfab2a73deea6e20dded666a164247eebd9a66bf5aaa7c60094039
-
SHA512
3ad38eae34e1e945497568fb7630cf363f0dd509f6896ff26a749b51191ba0f458c39cc784a855bc2115153bfe54b506fd45304d178a44ef92760fce4a69dca5
-
SSDEEP
384:8fQQ5BG71kpyVuqv+rKNZfAs61lniMMPWtzx3DWBGM/hznThI2Dy6aPJZ8UxpMEi:8167iEVzv+BbniMgCF+/hz22Dylnh3w
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fe42a9ea6f4ea977a1bdb272081b702
Files
-
1fe42a9ea6f4ea977a1bdb272081b702.exe windows:1 windows x86 arch:x86
dc517caf0d3cacd26685745305b9595b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcessHeap
GetSystemDirectoryA
GetTickCount
GetWindowsDirectoryA
CopyFileA
HeapAlloc
HeapFree
CreateDirectoryA
OpenMutexA
CreateFileA
ReadFile
RtlUnwind
RtlZeroMemory
SetFileAttributesA
SetFilePointer
CreateMutexA
Sleep
WriteFile
lstrcatA
lstrcmpiA
lstrlenA
CreateThread
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
exit
memset
raise
rand
signal
srand
strchr
strstr
strtok
shell32
ShellExecuteA
user32
wsprintfA
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
wsock32
WSAStartup
connect
gethostbyaddr
gethostbyname
htons
inet_addr
recv
send
socket
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE