Behavioral task
behavioral1
Sample
b7cb9c3d38a397324a224eed5eb05fd9.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b7cb9c3d38a397324a224eed5eb05fd9.exe
Resource
win10v2004-20240226-en
General
-
Target
b7cb9c3d38a397324a224eed5eb05fd9
-
Size
14KB
-
MD5
b7cb9c3d38a397324a224eed5eb05fd9
-
SHA1
8a30106876d9967fc064b554182001ef12e1b6fc
-
SHA256
e0333a33c2f0f44c55f6ecddaaa1692a6ee244e7c3f602ecc2d1a9f8782cdb5c
-
SHA512
09c43754a1c0ff50cd0043853567165b1489b4c9cb204e15da166b184a6ab17fc2400ba97035d35821daf70e4485391aa2264da64918921762da619df283393e
-
SSDEEP
96:gce0lix9wYWHiSX1ZemyecKRYy0NxQPffEVd+9kw+1+SC:gc38xfOxjfEg9kw+USC
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7cb9c3d38a397324a224eed5eb05fd9
Files
-
b7cb9c3d38a397324a224eed5eb05fd9.exe windows:4 windows x86 arch:x86
2e7f6b5895ef9e00432b8f82e96a5636
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
GetCommandLineA
CreateFileA
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
Sleep
CreateDirectoryA
CopyFileA
CloseHandle
GetFileSize
advapi32
StartServiceCtrlDispatcherA
SetServiceStatus
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegisterServiceCtrlHandlerA
user32
SetCursorPos
Sections
UPX0 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE