Behavioral task
behavioral1
Sample
51ddf3999932e1db70258a2305637d9b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51ddf3999932e1db70258a2305637d9b.exe
Resource
win10v2004-20231215-en
General
-
Target
51ddf3999932e1db70258a2305637d9b
-
Size
13KB
-
MD5
51ddf3999932e1db70258a2305637d9b
-
SHA1
e048b5b904c1a8d06a917a54f4add65ab27a1e5e
-
SHA256
a50f20535322dd2474bf7efb6f68a42629bb9f7933bc91d619f54d5f674aaf76
-
SHA512
445986194e80c493afe8d6991699ffa324bc6f9df69d3c21a95640dff1b055386d11f7badfc8f5d6e14fd248098c39190883f311cac7e8d0fae1182d497c960e
-
SSDEEP
384:8NjUM9LKULizYLOw/EtbHl2WU3ZyGe/m:8NISirbt7y3ZIm
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51ddf3999932e1db70258a2305637d9b
Files
-
51ddf3999932e1db70258a2305637d9b.exe windows:4 windows x86 arch:x86
60180305da1b391f4fc2af5784ddd919
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TransactNamedPipe
GetMailslotInfo
GetConsoleMode
SetFileApisToOEM
VDMConsoleOperation
lstrcatA
gdi32
UpdateICMRegKeyA
SetViewportExtEx
OffsetWindowOrgEx
CreateColorSpaceA
Sections
UPX0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE