Behavioral task
behavioral1
Sample
44dd9036781a9905414e7ef837b2b1a0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
44dd9036781a9905414e7ef837b2b1a0.exe
Resource
win10v2004-20231222-en
General
-
Target
44dd9036781a9905414e7ef837b2b1a0
-
Size
172KB
-
MD5
44dd9036781a9905414e7ef837b2b1a0
-
SHA1
fb33c91de7b2ef3bf92e540ab56e45dd6cca0b95
-
SHA256
531f8c44fabb01be258b8ad483ceb3ecdcc2233abb742e069514f9e1634841dd
-
SHA512
e338a2f174cfe0cefb6c37445f78db4e3199022c23ac6b3dbe4ba5c888339f21887b97986d755a12715b86cdd2c5f2434c9f943a85b5c748074d2c6bf8a29f51
-
SSDEEP
3072:i9qGg3H2wNhstXqT8fznc2M9RGP11D5mWZ:d3H6XFnMA11D5nZ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44dd9036781a9905414e7ef837b2b1a0
Files
-
44dd9036781a9905414e7ef837b2b1a0.exe windows:4 windows x86 arch:x86
68c39ba66b567c5d2eea9b2648b30041
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
CreateProcessA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE