Behavioral task
behavioral1
Sample
44a14f320cfc65d2ce2b0aa1b2bf0027.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44a14f320cfc65d2ce2b0aa1b2bf0027.exe
Resource
win10v2004-20231215-en
General
-
Target
44a14f320cfc65d2ce2b0aa1b2bf0027
-
Size
270KB
-
MD5
44a14f320cfc65d2ce2b0aa1b2bf0027
-
SHA1
d5f6f461374eef64014e2030facea9e3dcbdc916
-
SHA256
fb87c555d68b7f0d876b954f5fb00b5bb800e67d790cad5e937fdd13c01959aa
-
SHA512
f6261c074bb64ee7fcc21c6337bf0cfe5c88eafc3d96dba140069ef272ef25b9dfa3253a20f0fa121a9d903434507dc6bae5f5e113516c36a587ba00db1b9a6d
-
SSDEEP
6144:go4NTTsuJ9fTl6gZS/Rf7pZjDdd0Uu6gwS7xBH28Bj:X4NfsuJSdhdd0Uu6gw2BH5Bj
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44a14f320cfc65d2ce2b0aa1b2bf0027
Files
-
44a14f320cfc65d2ce2b0aa1b2bf0027.exe windows:4 windows x86 arch:x86
c6400dced7b74aaa9f5a124498168dd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
NdrServerCall2
RpcServerRegisterAuthInfoA
RpcServerUseProtseqEpA
RpcServerRegisterIf
RpcMgmtStopServerListening
RpcServerUnregisterIf
RpcServerInqBindings
RpcBindingVectorFree
RpcServerListen
kernel32
InitializeCriticalSection
GetSystemInfo
WaitForSingleObject
GetVersionExA
CreateEventA
SetEvent
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleHandleA
GetCurrentProcess
TlsAlloc
GetLastError
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentStringsW
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetProcessHeap
GetProcAddress
advapi32
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
scecli
SceStartTransaction
SceSetupUnwindSecurityFile
SceUpdateSecurityProfile
SceFreeProfileMemory
SceSetupUpdateSecurityKey
SceOpenPolicy
SceSvcSetInformationTemplate
ieaksie
DllRegisterServer
Sections
UPX1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kko Size: 3KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gFV Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ZVm Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jzyAY Size: 3KB - Virtual size: 487KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 101KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IEce Size: 5KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Ir Size: 3KB - Virtual size: 629KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 120KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ