Behavioral task
behavioral1
Sample
7300118ce097f10434edc4a559ad7655.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7300118ce097f10434edc4a559ad7655.exe
Resource
win10v2004-20231215-en
General
-
Target
7300118ce097f10434edc4a559ad7655
-
Size
65KB
-
MD5
7300118ce097f10434edc4a559ad7655
-
SHA1
529ec866dd5d936dadf2d4f02f2b4a5b2c6de59d
-
SHA256
09dfff82da091252d256a7ae93f1249e4895ade246e7b23369b01d77a4a9eb92
-
SHA512
e49ef6b14e892a6c61ff5ef7b43fea76fcd71646f4ddc34448ba90191c645990159b2ccf155cb12ffb4f5c9b0e7a92fed210743eda90b07b9a46187ad4881138
-
SSDEEP
768:r5cyt1U4RcbjOWEfjyJ8vGtyEiQtPJZ1B8eRd8knXm3/VYUjk2NzzwazTfR1JCmo:GLErMgE/Z1+eIkXm3/OhEzUQTJCm
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7300118ce097f10434edc4a559ad7655
Files
-
7300118ce097f10434edc4a559ad7655.exe windows:5 windows x86 arch:x86
e20d0135d787d00f76fd0ad7e5244722
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
WriteFile
GlobalAlloc
GetVolumeInformationA
CreateProcessA
ReadFile
GetTempPathW
LCMapStringA
_lwrite
GetTickCount
GetModuleFileNameA
GetFileAttributesExW
GetConsoleCursorInfo
CloseHandle
DeleteAtom
GetTempPathA
WriteConsoleOutputW
CallNamedPipeA
WritePrivateProfileStringA
WaitForSingleObject
SetLocaleInfoA
OpenFile
GlobalMemoryStatus
GetTempFileNameA
CreateFileA
VirtualProtect
ExitProcess
user32
LoadBitmapA
CreateCursor
wsprintfA
SetParent
ToAsciiEx
SendMessageCallbackA
SetMenuItemInfoW
FrameRect
DdeImpersonateClient
SendDlgItemMessageW
InflateRect
gdi32
CreateSolidBrush
CreateHalftonePalette
GetEnhMetaFileDescriptionA
CreatePen
RectVisible
SelectClipRgn
ws2_32
htonl
WSAStartup
connect
htons
bind
socket
closesocket
gethostbyname
send
recv
shlwapi
StrStrIA
iphlpapi
GetAdaptersInfo
msvcrt
memset
memcpy
Sections
.text Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: - Virtual size: 382B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.UPX2 Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ