Behavioral task
behavioral1
Sample
ba4bf7eb4dc590b477e2f6a6c8bf34fd.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ba4bf7eb4dc590b477e2f6a6c8bf34fd.exe
Resource
win10v2004-20231215-en
General
-
Target
ba4bf7eb4dc590b477e2f6a6c8bf34fd
-
Size
7KB
-
MD5
ba4bf7eb4dc590b477e2f6a6c8bf34fd
-
SHA1
2372f5b2f512cbed319b5bb7180abef3d39ed3ec
-
SHA256
62fd9cf15c1304ef3fba4294ef5d3fa00c8a87d7acf6029d24647459e48885f3
-
SHA512
89f00d6c7710621fddb42bb919be0af09b39a677d9ecf803aa80cab8221685d75e9d817c4b52c2798bbed537a539a638d6fb8a8324d445b809707301070145eb
-
SSDEEP
192:Y9qdSQazAzL6lNtydee1VObMU7Cek+opFpOViuH:Y9UfQNtydee1k3opYbH
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba4bf7eb4dc590b477e2f6a6c8bf34fd
Files
-
ba4bf7eb4dc590b477e2f6a6c8bf34fd.exe windows:4 windows x86 arch:x86
8245b89b69c5ffce5d231a6851c92032
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConnectNamedPipe
OpenWaitableTimerA
TlsGetValue
CreateVirtualBuffer
EnumSystemLocalesA
ExitVDM
gdi32
GetCharABCWidthsW
GetColorSpace
GetRegionData
ScaleViewportExtEx
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE