Behavioral task
behavioral1
Sample
aa661efb1e1135ad2f05e32db783ff9e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa661efb1e1135ad2f05e32db783ff9e.exe
Resource
win10v2004-20240226-en
General
-
Target
aa661efb1e1135ad2f05e32db783ff9e
-
Size
21KB
-
MD5
aa661efb1e1135ad2f05e32db783ff9e
-
SHA1
1bc10687ef636e12472805829e666ddf8b909f45
-
SHA256
8f605d7e99ae52a5a2a5b60537fa2d3361baf3027105b23614b7a7d7e30b96cd
-
SHA512
953d8e8a55d62f5bece17391392c5a8ce17d24634838eb2662fefeb6432a689ecfa2a90f4709a9c43a930245220529bfbcf8ff520e6123d3f862e0ea2df017bc
-
SSDEEP
192:4n4HcSxo1OjKLjOMB6GeAttaHHosr865UUYAKIA8KYg:U4Hc49je9BheZHILUpKMKY
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa661efb1e1135ad2f05e32db783ff9e
Files
-
aa661efb1e1135ad2f05e32db783ff9e.exe windows:4 windows x86 arch:x86
92047323e65ae42c32f84af51fa29d7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
WinExec
DeleteFileA
lstrcpyA
lstrcatA
GetWindowsDirectoryA
lstrlenA
CreateFileA
GetTempPathA
ExitProcess
GetModuleFileNameA
SetFileAttributesA
GetShortPathNameA
GetVersionExA
CopyFileA
VirtualFree
VirtualAlloc
ReadProcessMemory
GetModuleHandleA
OpenProcess
CloseHandle
WriteProcessMemory
CreateProcessA
GetCurrentProcessId
GetProcAddress
CreateRemoteThread
SetLastError
ResumeThread
advapi32
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
RegCloseKey
msvcrt
??3@YAXPAX@Z
fclose
fprintf
fopen
ftell
fseek
_filbuf
__CxxFrameHandler
strrchr
??2@YAPAXI@Z
shell32
FindExecutableA
urlmon
URLDownloadToFileA
user32
MessageBoxA
CharLowerA
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE