C:\Users\admin\Desktop\new version with NO UAC\Release\Win32Project9.pdb
Static task
static1
Behavioral task
behavioral1
Sample
11696c47b04179d17b4cd2b95eae281167a5663386a53f2ff0132bcffb1f3981.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
11696c47b04179d17b4cd2b95eae281167a5663386a53f2ff0132bcffb1f3981.exe
Resource
win10v2004-20240226-en
General
-
Target
11696c47b04179d17b4cd2b95eae281167a5663386a53f2ff0132bcffb1f3981
-
Size
388KB
-
MD5
8ad38259c72f25417ac9d8018fee0ceb
-
SHA1
84c711f71a19d6bf4d6c5be8b3b3131817e196ba
-
SHA256
11696c47b04179d17b4cd2b95eae281167a5663386a53f2ff0132bcffb1f3981
-
SHA512
7aa85582a228ec9f32181853d2652c716f778d7e8b5b1febd460aa197ef52bfc22dd915df334fb3ebc9f092132699eefa9c6688c4b2edfa7c80f53a1f9cd147d
-
SSDEEP
6144:EZ+76R6zQkU1BFQHUWVfIMqRiJSlHSnpPwoL6Ovvf5e+7kbDtVCvvy:A+76Y2/Q0W5IMqRiJSlU6ozQbDzCS
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11696c47b04179d17b4cd2b95eae281167a5663386a53f2ff0132bcffb1f3981
Files
-
11696c47b04179d17b4cd2b95eae281167a5663386a53f2ff0132bcffb1f3981.exe windows:5 windows x86 arch:x86
b2a404e40680652b351e4c09bec8d55c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
CreateProcessW
ExitThread
WaitForSingleObject
CreateMutexW
GetLastError
CheckRemoteDebuggerPresent
IsDebuggerPresent
ExitProcess
GetVersionExW
SetEndOfFile
HeapSize
WriteConsoleW
ReadConsoleW
SetStdHandle
GetProcAddress
FindFirstFileExW
FindClose
GetCommandLineW
GetCommandLineA
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetModuleHandleW
CreateProcessA
GetStartupInfoA
GetModuleFileNameW
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetModuleFileNameA
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetFileAttributesW
WaitForMultipleObjects
FindFirstFileW
FindNextFileW
SetFileAttributesW
GetLocalTime
CreateThread
WinExec
GetLogicalDrives
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
FreeLibrary
LoadLibraryExW
RaiseException
RtlUnwind
QueryPerformanceFrequency
MoveFileExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetACP
HeapAlloc
HeapReAlloc
HeapFree
GetFileType
GetExitCodeProcess
GetFileAttributesExW
user32
EndPaint
GetSystemMetrics
LoadCursorW
ScreenToClient
GetCursorPos
DrawTextA
MessageBoxW
DefWindowProcW
PostQuitMessage
DestroyWindow
SetTimer
KillTimer
RegisterClassExW
InvalidateRect
DrawTextW
FillRect
BeginPaint
DispatchMessageW
TranslateMessage
GetMessageW
GetWindowLongW
SetWindowLongW
ShowWindow
CreateWindowExW
gdi32
SetLayout
CreateCompatibleDC
LineTo
MoveToEx
CreatePen
SetBkMode
DeleteObject
TextOutA
TextOutW
SetTextColor
SetBkColor
SelectObject
CreateFontW
CreateSolidBrush
ScaleWindowExtEx
advapi32
SystemFunction036
GetUserNameA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetUserNameW
wininet
InternetOpenW
InternetOpenUrlW
InternetReadFile
netapi32
NetUserGetInfo
Sections
.text Size: 270KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ