Behavioral task
behavioral1
Sample
247d94ebb50a72fd9d75c5df7d864952.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
247d94ebb50a72fd9d75c5df7d864952.exe
Resource
win10v2004-20231215-en
General
-
Target
247d94ebb50a72fd9d75c5df7d864952
-
Size
39KB
-
MD5
247d94ebb50a72fd9d75c5df7d864952
-
SHA1
9de88dc7fa9b1499e221df1f5cf6ce166dcab7fd
-
SHA256
271e1e947b535f62662389909cb701b57b487aa9006e4a002805f392d72360b7
-
SHA512
ade493650c787197606f4cb429f2b5f6dd5e7c819eab906bce2f7e9ce5ebc75cf364cee5c2a0568bceda1dfb65d0aa0a98871b7893e524d66a948b2578f16d62
-
SSDEEP
384:kGo5+c+uWyog1vhTk2Hlbt5jchgpm7WzMrvv5p0yAZ4U8Jt5Zy6Lx:kGo5+c+uWyog1vhTjFACzMrvhKZ4U
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 247d94ebb50a72fd9d75c5df7d864952
Files
-
247d94ebb50a72fd9d75c5df7d864952.exe windows:4 windows x86 arch:x86
0c6628ec23ae14d73821dc5a16bcd4f7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GlobalFree
GetModuleHandleA
ReadFile
SetFilePointer
WriteFile
lstrcpyA
CreateFileA
CloseHandle
ExitProcess
comdlg32
GetOpenFileNameA
gdi32
DeleteObject
CreateFontIndirectA
shell32
ShellExecuteA
user32
GetDlgItem
CreateWindowExA
DispatchMessageA
DestroyWindow
LoadIconA
EnableWindow
GetDlgItemTextA
PeekMessageA
RegisterClassExA
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
DefWindowProcA
PostQuitMessage
GetSystemMetrics
GetMessageA
LoadCursorA
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE