Behavioral task
behavioral1
Sample
7c15be1db7a74e35bce972fa45808ae3a65fd484ea1f5d9bc75a51c32607b7b5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c15be1db7a74e35bce972fa45808ae3a65fd484ea1f5d9bc75a51c32607b7b5.exe
Resource
win10v2004-20231215-en
General
-
Target
7c15be1db7a74e35bce972fa45808ae3a65fd484ea1f5d9bc75a51c32607b7b5.exe
-
Size
9.2MB
-
MD5
2529e3589f01fafd5270407ea953612e
-
SHA1
3a44895434f7f3bff2c602595f2d23ef1571e2a4
-
SHA256
7c15be1db7a74e35bce972fa45808ae3a65fd484ea1f5d9bc75a51c32607b7b5
-
SHA512
91d78af6785b93fd212e69654b61a3c65969cde664e39f9efa9b67a5be97449b09ecb8c0b8b73c130b00d866c69e9cc483e0604a8e84dd23a24d19a3284f1c90
-
SSDEEP
196608:PA6zKWM199U+zeoPW7c4U7svA0qlNCsDx/610i4Zd/xkt:nWWM19DSo+7ctsvW88N6GDZd/it
Malware Config
Signatures
-
Detects Pyinstaller 1 IoCs
resource yara_rule sample pyinstaller -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c15be1db7a74e35bce972fa45808ae3a65fd484ea1f5d9bc75a51c32607b7b5.exe
Files
-
7c15be1db7a74e35bce972fa45808ae3a65fd484ea1f5d9bc75a51c32607b7b5.exe.exe windows:4 windows x86 arch:x86
8c2569b7ea105c161af93da6bcc0dfa4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
WaitForSingleObject
GetCurrentDirectoryW
SetEndOfFile
GetStringTypeW
GetStringTypeA
LoadLibraryA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetCPInfo
CreateProcessA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
MultiByteToWideChar
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
WideCharToMultiByte
HeapFree
GetLastError
LocalFree
SetFileTime
LocalFileTimeToFileTime
GetFullPathNameW
GetFullPathNameA
GetTempPathW
GetTempPathA
GetModuleFileNameW
DeleteFileW
DeleteFileA
SetFilePointer
GetFileAttributesW
CreateDirectoryW
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
CreateFileA
Sleep
GetTickCount
GetACP
GetOEMCP
FormatMessageA
GetModuleFileNameA
CreateFileW
CloseHandle
GetFileTime
ReadFile
WriteFile
GetFileSize
FileTimeToLocalFileTime
GetVersionExA
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapReAlloc
HeapAlloc
HeapSize
GetProcAddress
GetExitCodeProcess
user32
PostMessageA
SetTimer
GetDlgItemTextA
LoadStringA
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
GetDlgItemTextW
SetWindowTextW
MoveWindow
SetDlgItemTextW
EnableWindow
EndDialog
PostQuitMessage
MessageBoxW
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
CreateWindowExW
DialogBoxParamW
LoadCursorA
RegisterClassExW
LoadStringW
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
GetDlgItem
SendMessageA
SetDlgItemTextA
shell32
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
advapi32
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
Sections
.text Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ