Behavioral task
behavioral1
Sample
1a6c5b8bfd8f920b974865fd02f0a653.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a6c5b8bfd8f920b974865fd02f0a653.exe
Resource
win10v2004-20231215-en
General
-
Target
1a6c5b8bfd8f920b974865fd02f0a653
-
Size
533KB
-
MD5
1a6c5b8bfd8f920b974865fd02f0a653
-
SHA1
424d6f8d6d5fc8cf60157057e9c5eb89569d6a6a
-
SHA256
e7ca3507a90c735b4ae79c82e1fbbf4f54fc67be57ffc9a382bb791f39378c25
-
SHA512
c4522fa0ec90eafda1622cc622623edbe988e5ed8a36408cc72605b0e0c18dd7358597c91242e319ee53f973affbe6b5644edc9ffad3fd34dd4d65564d5daae2
-
SSDEEP
6144:DtdfOXn6izncmKxvYyZV/pcGUuFunacwk4vIu61Y7ihILjzXGplUucYISPXjI1:DXIbUxcGUzndN4vn61Y7ihMXXGfZXU1
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a6c5b8bfd8f920b974865fd02f0a653
Files
-
1a6c5b8bfd8f920b974865fd02f0a653.exe windows:4 windows x86 arch:x86
5ebdb1ad8b074e51f010a4b46825cc2b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
CreateProcessA
GetCommandLineA
GetModuleFileNameA
GetStartupInfoA
SetEnvironmentVariableA
ReleaseMutex
Sleep
WaitForSingleObject
CreateMutexA
OpenMutexA
GetCurrentProcessId
CreateThread
GetCurrentThreadId
GetTickCount
CloseHandle
CreateFileA
VirtualQueryEx
FindClose
FindFirstFileA
FindFirstFileW
GetModuleFileNameW
GetExitCodeProcess
LeaveCriticalSection
ReadProcessMemory
EnterCriticalSection
ContinueDebugEvent
SetThreadContext
GetThreadContext
WaitForDebugEvent
InitializeCriticalSection
SuspendThread
DebugActiveProcess
ResumeThread
CreateProcessW
GetCommandLineW
GetStartupInfoW
MapViewOfFile
DuplicateHandle
SetThreadPriority
CreateFileMappingA
VirtualProtectEx
WriteProcessMemory
FlushFileBuffers
WriteFile
ExitProcess
CompareStringA
LCMapStringW
LCMapStringA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
CompareStringW
MultiByteToWideChar
SetFilePointer
HeapReAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapAlloc
GetVersion
GetLocalTime
GetSystemTime
GetTimeZoneInformation
RtlUnwind
TerminateProcess
GetVersionExA
SetLastError
LoadLibraryA
GetLastError
GetProcAddress
VirtualAlloc
VirtualProtect
GetEnvironmentVariableA
FreeConsole
GetCurrentProcess
GetModuleHandleA
user32
GetDesktopWindow
MoveWindow
SetPropA
EnumThreadWindows
GetPropA
WaitForInputIdle
GetMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
KillTimer
BeginPaint
EndPaint
LoadCursorA
RegisterClassA
GetAsyncKeyState
GetSystemMetrics
CreateWindowExA
SetTimer
PostMessageA
IsWindow
SetWindowTextA
CreateDialogIndirectParamA
ShowWindow
UpdateWindow
LoadStringA
LoadStringW
FindWindowA
SendMessageA
DestroyWindow
MessageBoxA
GetDlgItem
gdi32
SelectObject
BitBlt
DeleteObject
CreatePalette
CreateDCA
SelectPalette
RealizePalette
CreateDIBitmap
DeleteDC
CreateCompatibleDC
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 168KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 52KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 264KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE