Behavioral task
behavioral1
Sample
7b8ef82c7af12622ca583f66549ae02d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b8ef82c7af12622ca583f66549ae02d.exe
Resource
win10v2004-20231222-en
General
-
Target
7b8ef82c7af12622ca583f66549ae02d
-
Size
160KB
-
MD5
7b8ef82c7af12622ca583f66549ae02d
-
SHA1
fc87bf6585a591ff741d726581ebac5a4dd0d8fd
-
SHA256
fecf236270c4f3396b535d7d8e276a0babd3884f8afc807a23ceec7500d115f5
-
SHA512
005957a886764b65f6b9d6622767597d265625734c69b4d59c81fcd629756216c250fc6c207b77c8a829135ee9e5ed3fff3f6a68db37b1d75ac4894b5e4443a0
-
SSDEEP
3072:OnsKGh8lXBQ9fxUEWcym7kU8WIrDckdacVKHREJQ:OQh8lXBkxUEWa4BLVKKJQ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b8ef82c7af12622ca583f66549ae02d
Files
-
7b8ef82c7af12622ca583f66549ae02d.exe windows:4 windows x86 arch:x86
7d12a83e579f757951adfc7e474bbe00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LocalAlloc
TlsAlloc
GlobalFree
FreeLibrary
LeaveCriticalSection
GlobalUnlock
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalHandle
WritePrivateProfileStringA
SetLastError
GetProcessVersion
GetFileAttributesA
GetFileSize
GetFileTime
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
TerminateProcess
ExitThread
GetVersion
UnlockFile
lstrcatA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFindAtomA
GlobalGetAtomNameA
GlobalAddAtomA
FindFirstFileA
GetFullPathNameA
GetVolumeInformationA
GetProcAddress
FindClose
LoadLibraryA
SetEndOfFile
RaiseException
FlushFileBuffers
LockFile
InterlockedExchange
GetCommandLineA
CreateEventA
SetFilePointer
CreateFileA
ResumeThread
SuspendThread
SetThreadPriority
lstrcpyA
SetEvent
lstrcpynA
HeapReAlloc
SetErrorMode
GlobalLock
GetModuleHandleA
GlobalAlloc
GetLastError
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
CreateThread
GetProcessHeap
HeapAlloc
HeapFree
MultiByteToWideChar
GetModuleFileNameA
lstrlenA
LocalFree
ExitProcess
WriteFile
ReadFile
CreateProcessA
CreatePipe
GetCurrentProcess
DuplicateHandle
CloseHandle
GetStdHandle
WaitForSingleObject
TerminateThread
Sleep
GetACP
HeapSize
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
GetAce
StartServiceCtrlDispatcherA
RegCloseKey
RegSetValueExA
AddAccessAllowedAce
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
AddAce
SetSecurityDescriptorDacl
GetTokenInformation
GetLengthSid
CopySid
LogonUserA
CreateProcessAsUserA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
comctl32
comdlg32
GetFileTitleA
gdi32
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
GetDeviceCaps
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
SetBkColor
SetTextColor
GetObjectA
GetClipBox
netapi32
NetUserDel
NetUserAdd
NetLocalGroupAddMembers
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
ShowWindow
IsWindowEnabled
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
SetCursor
GetClassNameA
PtInRect
ClientToScreen
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
DestroyMenu
MessageBoxA
GetParent
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CharUpperA
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
LoadStringA
PostMessageA
PostQuitMessage
GetUserObjectSecurity
SetUserObjectSecurity
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
CloseWindowStation
CloseDesktop
EnableWindow
wsprintfA
GetTopWindow
CallNextHookEx
GetKeyState
SetWindowPos
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ws2_32
Sections
UPX0 Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE