Behavioral task
behavioral1
Sample
5f48f3e238dda8c4877e6a73737720edea5f7b4515e9896f01580e033071f145.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5f48f3e238dda8c4877e6a73737720edea5f7b4515e9896f01580e033071f145.exe
Resource
win10v2004-20240226-en
General
-
Target
5f48f3e238dda8c4877e6a73737720edea5f7b4515e9896f01580e033071f145
-
Size
6.6MB
-
MD5
a8e4e2c8b16c67ee999bcd820902e942
-
SHA1
20dc0659f04ef761b0389ff8e43f9ed2f96345c3
-
SHA256
5f48f3e238dda8c4877e6a73737720edea5f7b4515e9896f01580e033071f145
-
SHA512
e1e87b3263dc0b65bb51f9d8b2dd915ab9735983b65bc9023d35f3686472ff190ad86cbb21f2eff762bfe0086e341d798846a1e70e6fb6b24b9bb69791e8ba1e
-
SSDEEP
196608:y6O7wqheSVYK/bua/BlWWnuVhsus8nm+q406T:lO8qgSmIbr/Asb8nmFiT
Malware Config
Signatures
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f48f3e238dda8c4877e6a73737720edea5f7b4515e9896f01580e033071f145
Files
-
5f48f3e238dda8c4877e6a73737720edea5f7b4515e9896f01580e033071f145.exe windows:4 windows x86 arch:x86
9973fdd4b86d866b3faa39fa66cf7e0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
WriteFile
ReadFile
GetWindowsDirectoryA
GetLastError
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitProcess
DeleteFileA
CreateMutexA
CreateFileA
CopyFileA
CloseHandle
GetCurrentThreadId
GetLastError
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
GetCommandLineA
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegFlushKey
RegCreateKeyExA
RegCloseKey
user32
CharNextA
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE