Behavioral task
behavioral1
Sample
7386a20f81e562e2ce9eb9b34b3a8719.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7386a20f81e562e2ce9eb9b34b3a8719.exe
Resource
win10v2004-20231215-en
General
-
Target
7386a20f81e562e2ce9eb9b34b3a8719
-
Size
91KB
-
MD5
7386a20f81e562e2ce9eb9b34b3a8719
-
SHA1
98311f5ccde7107f143be2118eb3b3d6ac65f859
-
SHA256
907fe98b319855ce5fa9bfcc36f1a30062e326993829f32b7bb7d24ffc66a185
-
SHA512
381af5f9639106255403c126908d8610b874f5270757dcced66342444e17825e026e0ebcdcd224a5f7c3f908169e10f3c3c7310887b0363d938200eda1a94178
-
SSDEEP
1536:kCRkDpC8jS3U3m7jPK3jkjWZEIRte9A4p1DR:Gp+3U36DORo/p1DR
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7386a20f81e562e2ce9eb9b34b3a8719
Files
-
7386a20f81e562e2ce9eb9b34b3a8719.exe windows:4 windows x86 arch:x86
821a9bff5be4f8db127c189af351f237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrlenA
lstrcmpiA
WritePrivateProfileStringA
WriteFile
SizeofResource
SetFilePointer
SetFileAttributesA
SetEndOfFile
ReadFile
MoveFileExA
LockResource
LoadResource
LoadLibraryExA
LoadLibraryA
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetFileSize
FreeResource
FreeLibrary
FindResourceA
DeleteFileA
CreateFileA
CopyFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shlwapi
PathFileExistsA
user32
CreateWindowExA
IsWindow
IsCharAlphaA
GetMessageA
FindWindowA
DispatchMessageA
GetKeyboardType
MessageBoxA
Sections
UPX0 Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE