Behavioral task
behavioral1
Sample
1d058eb42d10ee3a229f70ff478ec83c3cc870dad89b55fd8dedf2d446180006.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d058eb42d10ee3a229f70ff478ec83c3cc870dad89b55fd8dedf2d446180006.exe
Resource
win10v2004-20240226-en
General
-
Target
1d058eb42d10ee3a229f70ff478ec83c3cc870dad89b55fd8dedf2d446180006
-
Size
128KB
-
MD5
55c96c6dec3d2f1967ddf1a46f70b01b
-
SHA1
44b4e993f3c69a6f5a56821068c6df2928c1e3da
-
SHA256
1d058eb42d10ee3a229f70ff478ec83c3cc870dad89b55fd8dedf2d446180006
-
SHA512
dcae03c41f81205f2ad1619514a90909eda3aec89374f4b61a7bf135c1a79fa8bbc7557d222c4dcf8240bc7f732689a031e8c424570d0e052f383295e5f43c54
-
SSDEEP
768:thicfuej9IJTLYwxuioEpnp7JLyWWElhCR:thn2ej2JT0wkchplLyWWsgR
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d058eb42d10ee3a229f70ff478ec83c3cc870dad89b55fd8dedf2d446180006
Files
-
1d058eb42d10ee3a229f70ff478ec83c3cc870dad89b55fd8dedf2d446180006.exe windows:5 windows x86 arch:x86
7d52429e8c52197f294889d5841856af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
GetLastError
GetCommandLineA
ExitProcess
CreateFileA
LoadLibraryA
gdi32
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
user32
SendMessageA
ShowWindow
RegisterClassExA
UpdateWindow
PostQuitMessage
MoveWindow
MessageBoxA
LoadIconA
LoadCursorA
GetMessageA
DispatchMessageA
EndPaint
DestroyWindow
DefWindowProcA
CreateWindowExA
TranslateMessage
BeginPaint
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE