Behavioral task
behavioral1
Sample
8f3730a1aa8d806e5f34c74bbca6bffa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f3730a1aa8d806e5f34c74bbca6bffa.exe
Resource
win10v2004-20231215-en
General
-
Target
8f3730a1aa8d806e5f34c74bbca6bffa
-
Size
180KB
-
MD5
8f3730a1aa8d806e5f34c74bbca6bffa
-
SHA1
ef1e6be3b8e914bc9b02c8f6c2e6c42ce053995d
-
SHA256
b7c7e7df30454221a18d94aeb9c8a20d15c8e17a028ed30180bcd483b03f9a3f
-
SHA512
ac946a9e431166632dcf6809fc0ad076d8310304c6e12edd013a6633e61f07c1ef34127efdebe2d85abb152cbe9498c9b10a9bd76e0b42908a8c21b1731c56f6
-
SSDEEP
3072:a5iHJlo2cyQ7gjloMRvCGvjh7CRGz6p/G7gFBSzusjXxurq+f1pjmDV1gOUwuYV/:/IMhb7h7C8CGIjqXsq+dPOUwPV/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f3730a1aa8d806e5f34c74bbca6bffa
Files
-
8f3730a1aa8d806e5f34c74bbca6bffa.exe windows:4 windows x86 arch:x86
a74aa9f4f98ed1c69d3220ced999048c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetPrivateProfileStringA
CreateProcessA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE