Behavioral task
behavioral1
Sample
d505796d84101cdde281784068e59592.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d505796d84101cdde281784068e59592.exe
Resource
win10v2004-20240226-en
General
-
Target
d505796d84101cdde281784068e59592
-
Size
68KB
-
MD5
d505796d84101cdde281784068e59592
-
SHA1
037f913fe3ef78b593aa2483ddd46c771e8b4915
-
SHA256
866ef3c2cb70206812f07a7abd10e394cde1fea8fba1daa6dc0089c5fc5704f8
-
SHA512
97958bd909714844f9c5dafbd209ba0e263f848847ddaf1fe34643c051a0c7b822bbbf2c8b48d79354717bededb8358b995538bcff7a2fd1d3791cac6f69fc1c
-
SSDEEP
768:0nWF+atqUIxymINa7iU+fcnRYnr0WgnwFJ/6i7FFnnps:M2PDIZfixu24Jn8L3na
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d505796d84101cdde281784068e59592
Files
-
d505796d84101cdde281784068e59592.exe windows:4 windows x86 arch:x86
85afaf47ab6dccb736818312f8571a7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetDriveTypeA
GetLogicalDriveStringsA
LoadLibraryA
OpenMutexA
CreateMutexA
CloseHandle
GetLastError
CreateFileA
GetFileSize
CreateProcessA
WriteFile
GetProcAddress
GetThreadContext
WaitForSingleObject
GetTickCount
ResumeThread
SetThreadContext
VirtualAllocEx
GetCurrentProcess
Sleep
GetEnvironmentVariableA
DeleteFileA
ExitProcess
GetCurrentProcessId
VirtualProtect
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
SetStdHandle
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapFree
SetUnhandledExceptionFilter
TerminateProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
InterlockedExchange
VirtualQuery
HeapAlloc
VirtualAlloc
HeapReAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
SetFilePointer
GetACP
GetOEMCP
GetCPInfo
GetSystemInfo
user32
MessageBoxA
GetForegroundWindow
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetSetOptionA
InternetQueryOptionA
HttpQueryInfoA
InternetOpenUrlA
Sections
UPX0 Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE