Behavioral task
behavioral1
Sample
534eff35c65ad1dff234ff90e5dc38e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
534eff35c65ad1dff234ff90e5dc38e4.exe
Resource
win10v2004-20231222-en
General
-
Target
534eff35c65ad1dff234ff90e5dc38e4
-
Size
41KB
-
MD5
534eff35c65ad1dff234ff90e5dc38e4
-
SHA1
86130768e1087481971f7ee1c086830370d6acab
-
SHA256
4ccfcf6b30f6bd83fdd138aa341acfefd1ec1db8ac234c29581e12559efa4fab
-
SHA512
dcac05bff62c7d464a5279f2f3d9d93707132a4752bec5972e7e391fcd3520bf7d257886a461cdf35528bb5baac93b1991257e17b49fa701c6e33fee5ef0d1d2
-
SSDEEP
768:+Vl3q4R4xgViVDKWTYjP0rmCWGEihZ3cp1/:+Vl3qJxFV1yEmJGEihWL/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 534eff35c65ad1dff234ff90e5dc38e4
Files
-
534eff35c65ad1dff234ff90e5dc38e4.exe windows:4 windows x86 arch:x86
aee9f2040ef9af89f57afbb542b012bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetUserDefaultLangID
CloseHandle
ReadFile
GetFileSize
CreateFileA
GetLocaleInfoA
FreeLibrary
GetProcAddress
GetCommandLineA
LoadLibraryA
CopyFileA
GlobalUnlock
GlobalLock
ResumeThread
SetThreadContext
GetThreadContext
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
CreateProcessA
GetStartupInfoA
Sleep
DeleteFileA
GetWindowsDirectoryA
LoadResource
GetModuleFileNameA
FindResourceA
SizeofResource
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
mfc42
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
fopen
localtime
asctime
fputs
fclose
tolower
time
_setmbcp
_strlwr
_mbscmp
__CxxFrameHandler
free
realloc
rand
malloc
srand
shell32
ShellExecuteA
user32
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
GetWindowTextA
PostQuitMessage
PostMessageA
LoadCursorA
RegisterClassA
SetClipboardViewer
SetTimer
GetMessageA
DispatchMessageA
DefWindowProcA
DestroyWindow
IsWindow
CreateWindowExA
wininet
InternetConnectA
InternetOpenA
InternetReadFile
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE