Behavioral task
behavioral1
Sample
1909f2a079fa047cfb3efdab02a7e843.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1909f2a079fa047cfb3efdab02a7e843.exe
Resource
win10v2004-20231215-en
General
-
Target
1909f2a079fa047cfb3efdab02a7e843
-
Size
132KB
-
MD5
1909f2a079fa047cfb3efdab02a7e843
-
SHA1
73996c7410bb1f0e03619a6603cf9f083e2d4c02
-
SHA256
02d758f9865ffc51978f3974087d062fee6e01dbf3a6d71be8840f4a32340dc2
-
SHA512
0637318d8c83c6bf3e6e5ccbda22c7f849ff1db31fd703c1e1b8012cc9d4e3c30278916f448af74e87ae12f0f1a1aa2e39d56390212b677fefd37a1a114a58da
-
SSDEEP
3072:pHy6VrxqS0frpydr5rh6L+zEtKeCKIVFQd1Q5ZDy4DLn9AischdqGd8Ne1:pJr1MpSr5rw+zaDoPVPy4D9Hdnd8g
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1909f2a079fa047cfb3efdab02a7e843
Files
-
1909f2a079fa047cfb3efdab02a7e843.exe windows:5 windows x86 arch:x86
356bc7bcc2e348d127074d30fedb7c70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
exit
_cexit
_XcptFilter
_exit
_c_exit
wcsncat
wcsrchr
swscanf
localeconv
swprintf
atoi
wcscmp
wcscpy
wcscat
setlocale
malloc
free
wcslen
??2@YAPAXI@Z
??3@YAXPAX@Z
wcsncpy
_except_handler3
advapi32
InitializeSecurityDescriptor
SetEntriesInAclW
SetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetSecurityDescriptorDacl
kernel32
GetVolumeInformationW
SetErrorMode
LocalFree
LoadLibraryW
ExpandEnvironmentStringsW
GetDateFormatW
GetTimeFormatW
GetCurrentThreadId
DeviceIoControl
ReleaseMutex
CreateFileW
GetFileSize
GetVolumeNameForVolumeMountPointW
OpenProcess
GetCurrentProcess
DuplicateHandle
FreeLibrary
GetDriveTypeW
DeleteFileW
GetTempFileNameW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
lstrcatW
WriteFile
GetLastError
GlobalLock
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalSize
GlobalAlloc
InterlockedIncrement
InterlockedDecrement
lstrlenW
lstrcpynW
lstrcpyW
SetThreadUILanguage
WideCharToMultiByte
GetConsoleOutputCP
WriteConsoleW
GetConsoleMode
GetFileType
GetStdHandle
FormatMessageW
SetEvent
WaitForSingleObject
CreateSemaphoreW
CloseHandle
ReleaseSemaphore
WaitForMultipleObjects
SetConsoleCtrlHandler
ResetEvent
CreateEventW
ntdll
NtQueryVolumeInformationFile
user32
wsprintfW
LoadStringW
ole32
CoRegisterClassObject
CoInitializeEx
CoUninitialize
ReleaseStgMedium
CoTaskMemFree
StringFromCLSID
CoCreateGuid
CoCreateInstanceEx
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE