Behavioral task
behavioral1
Sample
c9a00c9ef18d73b4b2db1cc061ef1199.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c9a00c9ef18d73b4b2db1cc061ef1199.exe
Resource
win10v2004-20240226-en
General
-
Target
c9a00c9ef18d73b4b2db1cc061ef1199
-
Size
87KB
-
MD5
c9a00c9ef18d73b4b2db1cc061ef1199
-
SHA1
31a3afd7de54b7f817e46c9b81d7a75f4490fc7b
-
SHA256
b5d70e80634bd95204817db8f6fc4deda20de022540c74702c1ad4346bf85440
-
SHA512
575eb926e3066a1281e8167ebcc6ea0f059682253d1c0300f5d944c2bd3f6b795ab14a059f83ea32dd67b1efa8a7b035dcf70585139a7af0a684be4181b7cd0c
-
SSDEEP
1536:NIqltmQMmXoUBIdSqWQKXYLJrXqjiGOpBlzYq+dgZUqCe8wK4u:wGXocIGTXY1qj4Yq2gZ9CeQ4u
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c9a00c9ef18d73b4b2db1cc061ef1199
Files
-
c9a00c9ef18d73b4b2db1cc061ef1199.exe windows:4 windows x86 arch:x86
8fe3e79f43070da6cb6553fb089a610d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrlenA
lstrcmpiA
WritePrivateProfileStringA
WriteFile
SizeofResource
SetFilePointer
SetEndOfFile
ReadFile
MoveFileExA
LockResource
LoadResource
LoadLibraryA
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
GetProcAddress
GetModuleFileNameA
GetFileSize
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
DeleteFileA
CreateProcessA
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
user32
CreateWindowExA
IsChild
GetParent
GetMessageA
GetForegroundWindow
GetFocus
GetDlgCtrlID
FindWindowA
DispatchMessageA
DestroyWindow
GetKeyboardType
MessageBoxA
CharNextA
Sections
UPX0 Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE