Behavioral task
behavioral1
Sample
11ff5f0efe5dd4b38d267fa5483645d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11ff5f0efe5dd4b38d267fa5483645d8.exe
Resource
win10v2004-20231215-en
General
-
Target
11ff5f0efe5dd4b38d267fa5483645d8
-
Size
98KB
-
MD5
11ff5f0efe5dd4b38d267fa5483645d8
-
SHA1
581214006940ef93042aea0a4023ce2355a5f46d
-
SHA256
0f8ef87030baa26818b477c41a56ce489c827fd0b25270f4035445170a5407bf
-
SHA512
a65b07a92d5407a37786a6967aee51995a03c183ac346a3ee068d80a4f21f96450c512a087d2c9263786d5f5fa074b4523989c62cc6db55fd208d3f1a253c829
-
SSDEEP
1536:7+RuqmkeOHvyDb37cBhDitE3QgfV8reN7Psd74L8YxyYrG:7QuvwHOI3iWSi7EdsLnxyYS
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11ff5f0efe5dd4b38d267fa5483645d8
Files
-
11ff5f0efe5dd4b38d267fa5483645d8.exe windows:4 windows x86 arch:x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 112KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE