Behavioral task
behavioral1
Sample
09763551d7e9fa4a8a89899fbe3d7875.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09763551d7e9fa4a8a89899fbe3d7875.exe
Resource
win10v2004-20231215-en
General
-
Target
09763551d7e9fa4a8a89899fbe3d7875
-
Size
64KB
-
MD5
09763551d7e9fa4a8a89899fbe3d7875
-
SHA1
43f550e5a59d684f000b0f5f244b530f55316d8f
-
SHA256
2ad96062f91f31b95b2320eab29aa84db47b6040c030018caaf858ea6dc50b31
-
SHA512
4e557cb8d4495589b7e9abe78488d92ce7812e4ccff03c69d18aca86dee8aa1de12b53d1b1c142e67ecec3c8eff82fdfc79e38397ec8a976b4f0f270454224fe
-
SSDEEP
768:7gg5Hv4JcYukIzscqmczI0mBlQ8Ce8TfAl6oltS0+s1AilroRBAnlms:UgN4JcvQcqmnXBO8A26u+/ilERBAnH
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09763551d7e9fa4a8a89899fbe3d7875
Files
-
09763551d7e9fa4a8a89899fbe3d7875.exe windows:4 windows x86 arch:x86
92c9d620fac6d73ce20073917ee4c43c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetSystemDirectoryA
GlobalAlloc
GetCommandLineA
FreeLibrary
LoadLibraryA
GetProcAddress
GetCurrentProcessId
CopyFileA
GetComputerNameA
ExitProcess
HeapAlloc
GetModuleHandleA
IsBadWritePtr
GetStartupInfoA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
HeapSize
UnhandledExceptionFilter
WriteFile
VirtualFree
HeapCreate
RtlUnwind
Sleep
TerminateProcess
GetCurrentProcess
VirtualAlloc
SetUnhandledExceptionFilter
GetVersion
RaiseException
HeapFree
HeapReAlloc
HeapDestroy
WideCharToMultiByte
GetEnvironmentStrings
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetStdHandle
GetEnvironmentStringsW
SetHandleCount
GetFileType
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
RegQueryValueExA
rasapi32
RasEnumConnectionsA
RasEnumEntriesA
RasGetEntryDialParamsA
RasGetEntryPropertiesA
shell32
ShellExecuteA
user32
CharToOemA
wsock32
Sections
UPX0 Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE