Behavioral task
behavioral1
Sample
5602a896b0d433cd53a9aef98322c7bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5602a896b0d433cd53a9aef98322c7bf.exe
Resource
win10v2004-20231215-en
General
-
Target
5602a896b0d433cd53a9aef98322c7bf
-
Size
48KB
-
MD5
5602a896b0d433cd53a9aef98322c7bf
-
SHA1
7f30dc1deffa8b6c03457e85465084d686d01d69
-
SHA256
db69a9647f3f369d88e846a59a790399b5c4ff1df49dff3c9bbfb1c4e5351737
-
SHA512
3e792df5debf1550f6f9535faf909bf2eb307daed9760bf6a86efa382e474f7f95c3ea0aecf7d9046461625c024d792d2537a5fe55353641e1afcde738831489
-
SSDEEP
768:7ONh9z/jXrD/86DSk7Yg7zUOiKn6IdWDW6w9enWjcIlrgkwqxD:70V06Djn6IMDW61kZ7
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5602a896b0d433cd53a9aef98322c7bf
Files
-
5602a896b0d433cd53a9aef98322c7bf.exe windows:4 windows x86 arch:x86
60180305da1b391f4fc2af5784ddd919
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TransactNamedPipe
GetMailslotInfo
GetConsoleMode
SetFileApisToOEM
VDMConsoleOperation
lstrcatA
gdi32
UpdateICMRegKeyA
SetViewportExtEx
OffsetWindowOrgEx
CreateColorSpaceA
Sections
UPX0 Size: - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE