Behavioral task
behavioral1
Sample
c3c70f6595490fd8ba02d3dd95677f58.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3c70f6595490fd8ba02d3dd95677f58.exe
Resource
win10v2004-20231215-en
General
-
Target
c3c70f6595490fd8ba02d3dd95677f58
-
Size
148KB
-
MD5
c3c70f6595490fd8ba02d3dd95677f58
-
SHA1
0048ceae3d8ccc3c9191744075d90cba4ac84995
-
SHA256
fc941e19faba447108002e32c125055fec4afea0559c1f9dcf863c8890490007
-
SHA512
c42a1759283cc711bbe737fbdb8d383a9d478f8ab4e909ceb92d2dbb89433431ca0f1fca722b40240ca6cd39c2088f96f11824bade55fefd264e879c752ebc49
-
SSDEEP
1536:i6lnivVXnqUGH653WEAPOp58lxMns/s/aAN8iKb:i3nqUGI35APgWln/s/aE8iKb
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3c70f6595490fd8ba02d3dd95677f58
Files
-
c3c70f6595490fd8ba02d3dd95677f58.exe windows:4 windows x86 arch:x86
8219f7986415a2e7c3367a95ccfdc912
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
LockResource
MapViewOfFile
LoadLibraryA
MultiByteToWideChar
OpenProcess
SetCurrentDirectoryA
SetEndOfFile
Sleep
HeapFree
HeapReAlloc
GetLocalTime
_lclose
_lcreat
_llseek
_lopen
lstrcatA
GetDriveTypeA
lstrcpyA
lstrcpynA
lstrlenA
HeapAlloc
GetWindowsDirectoryA
GetVersionExA
GetSystemDirectoryA
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
UnmapViewOfFile
_hread
_hwrite
CreateDirectoryA
CreateFileMappingA
lstrcmpA
CloseHandle
CreateThread
ExitProcess
FindClose
GetEnvironmentVariableA
FindFirstFileA
FindResourceA
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcessId
advapi32
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
GetUserNameA
comctl32
InitCommonControls
gdi32
CreateFontA
CreateBrushIndirect
CreatePen
GetStockObject
GetTextExtentPoint32A
Rectangle
SelectObject
SetBkMode
SetDIBitsToDevice
SetTextColor
ole32
CoUninitialize
CoInitialize
CoCreateInstance
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
user32
SetFocus
SetTimer
SetWindowPos
SetWindowTextA
ShowWindow
SetCursor
TranslateMessage
MapDialogRect
LoadIconA
LoadCursorA
KillTimer
InvalidateRect
GetWindowTextA
SendMessageA
SetCapture
GetDialogBaseUnits
FindWindowA
ExitWindowsEx
EndPaint
EndDialog
EnableWindow
DispatchMessageA
DialogBoxParamA
DestroyWindow
DefWindowProcA
CreateWindowExA
ClientToScreen
BeginPaint
wsprintfA
ReleaseCapture
RegisterClassExA
PtInRect
PostQuitMessage
MessageBoxA
GetDlgItem
GetDlgCtrlID
GetMessageA
GetSystemMetrics
FindWindowExA
GetDC
Sections
UPX0 Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE