Static task
static1
Behavioral task
behavioral1
Sample
2014cedc6f3914fbb1bf90c5a9a61806ac1f216243973575bff2c2d651f4001c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2014cedc6f3914fbb1bf90c5a9a61806ac1f216243973575bff2c2d651f4001c.exe
Resource
win10v2004-20240412-en
General
-
Target
2014cedc6f3914fbb1bf90c5a9a61806ac1f216243973575bff2c2d651f4001c
-
Size
348KB
-
MD5
0227d18aa59df5af83358acedb71a2a5
-
SHA1
aed63e6035e6cb817831d8020b216f9bc2e5cfb7
-
SHA256
2014cedc6f3914fbb1bf90c5a9a61806ac1f216243973575bff2c2d651f4001c
-
SHA512
339548d1d2aad163c80a21296dd1716cd574ac50f2065353cf173487f9c64696ba8657ba2a64491231303dc4059e7d3fd13a14bb02a6c4edb7c3c6f2b432a487
-
SSDEEP
6144:9/5ybPL6fUZLEZZXgsO/5ybPG3xzu02/5ybPLpd:qbPyREsxbPOxzrbPL
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_MPress -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2014cedc6f3914fbb1bf90c5a9a61806ac1f216243973575bff2c2d651f4001c
Files
-
2014cedc6f3914fbb1bf90c5a9a61806ac1f216243973575bff2c2d651f4001c.exe windows:4 windows x86 arch:x86
37dcf0a1381d383fdd68f2e4a57ea66a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateFileA
FileTimeToSystemTime
FormatMessageW
FreeLibrary
GetComputerNameExW
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoW
GetStdHandle
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeFormatW
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
QueryPerformanceCounter
ReadConsoleW
ReadFile
SetConsoleCursorPosition
SetConsoleMode
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualProtect
WideCharToMultiByte
WriteConsoleW
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetConsoleScreenBufferInfo
user32
DrawIcon
EnableWindow
GetClientRect
GetSystemMetrics
IsIconic
LoadAcceleratorsA
LoadIconW
LoadStringW
PostMessageW
RegisterClassA
SendMessageW
wsprintfW
CharUpperW
advapi32
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
framedyn
??0CHString@@QAE@PBG@Z
??0CHString@@QAE@XZ
??1CHString@@QAE@XZ
??4CHString@@QAEABV0@ABV0@@Z
??4CHString@@QAEABV0@PBG@Z
??YCHString@@QAEABV0@PBG@Z
?Compare@CHString@@QBEHPBG@Z
?Find@CHString@@QBEHG@Z
?FindOneOf@CHString@@QBEHPBG@Z
?Format@CHString@@QAAXPBGZZ
?GetData@CHString@@IBEPAUCHStringData@@XZ
?Left@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@HH@Z
?ReleaseBuffer@CHString@@QAEXH@Z
?GetBufferSetLength@CHString@@QAEPAGH@Z
ole32
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeSecurity
mpr
WNetCancelConnection2W
WNetGetLastErrorW
secur32
GetUserNameExW
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 8B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 106B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
LxYetqSg Size: 1KB - Virtual size: 1KB
ZACxLDzo Size: 7KB - Virtual size: 6KB
fkNQMUIf Size: 26KB - Virtual size: 25KB
vefBkJmd Size: 4KB - Virtual size: 4KB
FDDSSMVl Size: 2KB - Virtual size: 1KB
yACHnkit Size: 1KB - Virtual size: 1KB
DGyqraFi Size: 107KB - Virtual size: 107KB
YBcfVlbc Size: 3KB - Virtual size: 3KB
xdnJKtOG Size: 35KB - Virtual size: 34KB
FSJEgUQZ Size: 32KB - Virtual size: 32KB