URdvyrmBa@8
Static task
static1
Behavioral task
behavioral1
Sample
9a59a331584c4ac07304460113347d6b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a59a331584c4ac07304460113347d6b.exe
Resource
win10v2004-20231215-en
General
-
Target
9a59a331584c4ac07304460113347d6b
-
Size
100KB
-
MD5
9a59a331584c4ac07304460113347d6b
-
SHA1
d13439c3f468b8ed656268b1573e90229df8c700
-
SHA256
46927a1629bf9df3b0e8e72211421f0d57382a287a14f530c627db828fa9f2c8
-
SHA512
a2268c7cba2bbbd7d9a0f1100b5815bed4697710f140cbe6a33c7ad8591fd6b9d8e6e9fe1624230c2388b040917623f1ed3e408ad38da42563b5b45ffa535683
-
SSDEEP
1536:g+ZxkiqzfcFDy95jC4t6fZGq3+mzwK5aB+yipX6vXgozR0B4m9:nx0zEFDejvIxGq3gKG+yGmgoV0GE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a59a331584c4ac07304460113347d6b
Files
-
9a59a331584c4ac07304460113347d6b.exe windows:4 windows x86 arch:x86
e954d35a261032719bfd4fb5e306cdf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
lstrlenW
GetFileAttributesA
IsBadHugeReadPtr
ExitProcess
GetSystemDefaultLangID
LoadLibraryA
GetVersionExA
GetEnvironmentStrings
Sleep
HeapDestroy
LoadResource
GetOEMCP
GetUserDefaultLCID
MulDiv
SetFilePointer
VirtualAlloc
MoveFileA
GetStringTypeW
SizeofResource
GetStartupInfoA
LockResource
GetLastError
GetFullPathNameA
FindResourceA
shell32
DragQueryFileA
shlwapi
SHQueryInfoKeyA
SHGetValueA
user32
SetWindowLongA
IsDialogMessageA
GetKeyboardState
SetRect
CharNextW
OpenClipboard
SetWindowPlacement
PeekMessageA
DestroyMenu
IsZoomed
EqualRect
GetMessagePos
GetTopWindow
GetKeyState
ShowOwnedPopups
AdjustWindowRectEx
DefMDIChildProcA
GetDlgItem
GetWindowLongW
GetClientRect
IsCharUpperA
LoadCursorA
UnhookWindowsHookEx
SetMenuItemInfoA
IsChild
DispatchMessageA
GetScrollInfo
GetPropA
FrameRect
GetSubMenu
EndDialog
TrackPopupMenu
IsCharLowerA
RemovePropA
CreateMenu
WindowFromPoint
GetMenuItemInfoA
PostQuitMessage
GetMenuStringA
IntersectRect
FindWindowA
GetLastActivePopup
SetScrollPos
GetWindowLongA
SetFocus
GetCursor
GetSystemMenu
IsWindowUnicode
PeekMessageW
CallNextHookEx
GetWindowDC
MapWindowPoints
GetMenuItemCount
LoadKeyboardLayoutA
SetCapture
GetScrollRange
PostMessageA
CharUpperA
RegisterClassA
GetMenu
EnableMenuItem
InsertMenuA
SetWindowsHookExA
CloseClipboard
Exports
Exports
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ