Behavioral task
behavioral1
Sample
11b7da29b518f40527640a5f8be2ac55.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11b7da29b518f40527640a5f8be2ac55.exe
Resource
win10v2004-20231215-en
General
-
Target
11b7da29b518f40527640a5f8be2ac55
-
Size
140KB
-
MD5
11b7da29b518f40527640a5f8be2ac55
-
SHA1
8c64fe4fc8133297fb8ed9fc882ad5211db40047
-
SHA256
95c412721fad8a2cffa2295e53f8f09997a9b342fe5ed377a74d05a2e11b4a34
-
SHA512
2ec41810f3ec778d96f9c2ce0d08fcbc4286bb6a1c2a44de541e9ccd91ad6780c19bdd296752f08158b7910c7ee9c2058eb46d998aa6fbde8449e8b383610274
-
SSDEEP
3072:ZiKgrxmxrC3f3Rjz3Pc3HSFbDaD6zfDEVHQ2u/Xu5nEgr:ZiKgrxmx+3f3Fc3yFbDaDCDEVHlu/XY
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11b7da29b518f40527640a5f8be2ac55
Files
-
11b7da29b518f40527640a5f8be2ac55.exe .vbs windows:5 windows x86 arch:x86 polyglot
39b39bbb163f0884f72ad82728d73a76
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
nddeapi
ord501
ord509
msvcrt
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_exit
_c_exit
sprintf
_controlfp
advapi32
RegOpenKeyExA
GetTokenInformation
IsValidSecurityDescriptor
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorLength
MakeSelfRelativeSD
OpenThreadToken
OpenProcessToken
RegSetValueExA
RegEnumValueA
RegDeleteValueW
GetSecurityDescriptorDacl
GetAce
SetFileSecurityW
RegSetValueExW
RevertToSelf
RegDeleteValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegCreateKeyExA
RegCloseKey
kernel32
CreateFileW
DeleteFileW
GetLastError
GetComputerNameA
lstrcmpW
MultiByteToWideChar
LocalAlloc
lstrlenW
CreateFileA
GetTickCount
GetWindowsDirectoryA
lstrlenA
lstrcpyA
lstrcmpA
lstrcpyW
WriteFile
GlobalFree
GlobalHandle
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalSize
DeleteFileA
lstrcatA
GlobalReAlloc
GetCurrentProcess
GetCurrentThread
WideCharToMultiByte
SetUnhandledExceptionFilter
LocalFree
lstrcmpiA
GetModuleHandleA
CloseHandle
CreateMutexA
WaitForSingleObject
ReleaseMutex
ReadFile
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetFilePointer
gdi32
SetMapMode
SaveDC
GetEnhMetaFileHeader
PatBlt
SelectObject
CreateBitmap
CreateCompatibleDC
CreateBitmapIndirect
SetMetaFileBitsEx
CreatePalette
SetEnhMetaFileBits
GetDIBits
RealizePalette
SelectPalette
CreateDIBitmap
SetStretchBltMode
RestoreDC
PlayMetaFile
SetViewportOrgEx
PlayEnhMetaFile
SetWindowExtEx
GetPaletteEntries
StretchBlt
SetViewportExtEx
GetStockObject
CreateFontA
DeleteObject
DeleteDC
GetBitmapBits
GetEnhMetaFileBits
GetObjectA
GetMetaFileBitsEx
user32
GetDC
ReleaseDC
FillRect
DrawTextA
DrawTextW
LoadCursorA
SetCursor
ShowCursor
EnumClipboardFormats
GetClipboardFormatNameW
LoadStringW
SendMessageA
RegisterClipboardFormatA
PostQuitMessage
DdeUninitialize
DdeNameService
SetClipboardData
DefWindowProcA
DdeAddData
DdeUnaccessData
DdeFreeDataHandle
DdeAccessData
DdeCreateDataHandle
RegisterClipboardFormatW
OpenClipboard
CloseClipboard
DdeInitializeA
CreateWindowExA
SetProcessWindowStation
OpenWindowStationA
RegisterClassA
LoadIconA
UnregisterClassA
DispatchMessageA
TranslateMessage
GetMessageA
DdeKeepStringHandle
DdeCmpStringHandles
DdeFreeStringHandle
DdeQueryStringA
DdePostAdvise
DdeImpersonateClient
DdeCreateStringHandleA
DdeCreateStringHandleW
wsprintfA
DdeGetLastError
DdeGetData
wsprintfW
EmptyClipboard
CountClipboardFormats
IsClipboardFormatAvailable
GetClipboardData
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE