Behavioral task
behavioral1
Sample
454.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
454.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
googleup.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
googleup.exe
Resource
win10v2004-20231215-en
General
-
Target
400746f18da8e3b0c72192fd4f22b516
-
Size
423KB
-
MD5
400746f18da8e3b0c72192fd4f22b516
-
SHA1
75f1a7b1824c83cbb87cae9ad42ec190abaed4fb
-
SHA256
9b1d4cc2b92ca568b39c87da7b66d8a3424eb7c15002f58dc361388abe82ae8f
-
SHA512
eefec61d2183dd84f17da6433da5a9404ed9a0fdedee027520284e3b98f3609cc3c9d5af9add0a77741cf886e981d2b9bfd05f92bd5a1e1497188c0041003975
-
SSDEEP
12288:0SA6k58ny2Q3T8FajhYm5dZKTawL/B4wiN41bFKrRUG3/q:0B6k5JYFfm5dATeNUbslq
Malware Config
Signatures
-
resource yara_rule static1/unpack001/googleup.exe upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/454.exe unpack001/googleup.exe
Files
-
400746f18da8e3b0c72192fd4f22b516.cab
-
454.exe.exe windows:4 windows x86 arch:x86
6e51b73fc6d3af8478a5efd9ea4edcd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetCurrentThread
FindAtomA
GetTempPathA
GetConsoleTitleA
ExitProcess
CreateProcessA
WriteFile
lstrcatA
lstrcpynA
GetTempFileNameA
lstrcpyA
CreateFileA
GetModuleFileNameA
MoveFileExA
MoveFileA
DeleteFileA
GetModuleHandleA
GetSystemDirectoryA
TerminateProcess
WaitForSingleObject
FreeLibrary
LoadLibraryA
GetLocalTime
SystemTimeToFileTime
GetTickCount
CloseHandle
SetFileTime
GetShortPathNameA
GetStartupInfoA
advapi32
RegOpenKeyA
GetUserNameA
RegQueryValueExA
RegSetValueExA
RegCloseKey
user32
IsWindowVisible
GetDC
GetClassLongA
GetCursor
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
msvcrt
_acmdln
_controlfp
_except_handler3
__set_app_type
memset
??2@YAPAXI@Z
strlen
strcat
strcpy
_exit
_XcptFilter
exit
_ltoa
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
googleup.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 252KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 191KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE