Behavioral task
behavioral1
Sample
727ec2169730ff49bc0b73927a9ed4b8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
727ec2169730ff49bc0b73927a9ed4b8.exe
Resource
win10v2004-20231215-en
General
-
Target
727ec2169730ff49bc0b73927a9ed4b8
-
Size
250KB
-
MD5
727ec2169730ff49bc0b73927a9ed4b8
-
SHA1
eefb697370bed23ace6fe93b78de57c03e1791e6
-
SHA256
56f0dc8c7d96c286954ed45010bbf5a2216f28fd03c77d67d6f475fea5f94d54
-
SHA512
2e7cfb50eb36c93643786653431081388bc05a1b23ff85753f96cee96c06029f533d23621abdb2cb42177e14ac5fd3f8417d5e66cbf31d9121bbf067e44b6c5f
-
SSDEEP
3072:uGOFLomQsQtM25LSF12LT8nsQqIbSC3IzSNGOsDGLCpIfMhlGV6T3A/tROoHniXb:0XxQtJ2FSBYr3gOrEhdT3A/tROoHLQ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 727ec2169730ff49bc0b73927a9ed4b8
Files
-
727ec2169730ff49bc0b73927a9ed4b8.exe windows:4 windows x86 arch:x86
6ddcb287ba714291286e6072be43ad97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
ExpandEnvironmentStringsW
LoadLibraryA
GetSystemDirectoryW
GetWindowsDirectoryW
GetFileAttributesW
GetModuleFileNameW
lstrcatW
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentThreadId
GetVersionExA
TlsAlloc
GetModuleHandleA
MultiByteToWideChar
ExitProcess
HeapCreate
SetUnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentStringsW
GetCPInfo
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetSystemInfo
InitializeCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsBadCodePtr
GetLocalTime
GetProcAddress
advapi32
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegEnumValueW
mssip32
CryptSIPVerifyIndirectData
CryptSIPGetRegWorkingFlags
inseng
PurgeDownloadDirectory
Sections
.text Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 101KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 115KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ