Static task
static1
Behavioral task
behavioral1
Sample
d2fd6532d13c83258b0872613833204734ae3ea12ab37e90e046c675fc83e728.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d2fd6532d13c83258b0872613833204734ae3ea12ab37e90e046c675fc83e728.exe
Resource
win10v2004-20240508-en
General
-
Target
d2fd6532d13c83258b0872613833204734ae3ea12ab37e90e046c675fc83e728
-
Size
4.0MB
-
MD5
e0d7a0112018073b98b070a8e9535be9
-
SHA1
08b02c1eba19a1d4478b1d9af1e1d42120656afe
-
SHA256
d2fd6532d13c83258b0872613833204734ae3ea12ab37e90e046c675fc83e728
-
SHA512
ca97ec79675f92e9f5a6e221daf2d23e32cc53f587bf13842f6a6d7b32839c64c2ae020f8a6664fc2a2d09f32b544e6b28349db39c0c7490b433addf47fb3a87
-
SSDEEP
98304:YUq/cc0FeBHC9UOXX4KTNuclLCfPy6Kp5+SPsNQLD0imnCT:g/+oBi1XpTNuRfPsPiG0bnCT
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2fd6532d13c83258b0872613833204734ae3ea12ab37e90e046c675fc83e728
Files
-
d2fd6532d13c83258b0872613833204734ae3ea12ab37e90e046c675fc83e728.exe windows:5 windows x86 arch:x86
052d5e9947a741a8ece77b40e106ab1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryW
ProcessIdToSessionId
Sleep
CreateProcessW
TerminateProcess
LoadLibraryA
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
QueryPerformanceCounter
InitializeCriticalSection
TerminateThread
DeleteCriticalSection
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
SetEvent
CreateEventW
OutputDebugStringW
GetFileSizeEx
ReadFile
GetFileSize
InterlockedDecrement
GlobalAlloc
GlobalFree
VirtualQuery
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
CreateFileA
GetSystemDirectoryW
LoadLibraryW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
CreateThread
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleFileNameW
ExitProcess
SetUnhandledExceptionFilter
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetProcAddress
OpenProcess
MultiByteToWideChar
GetCurrentProcessId
WriteFile
GetTickCount
GetCurrentThreadId
SetFilePointerEx
GetLocaleInfoW
SetStdHandle
WriteConsoleW
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
GetProcessId
CreateRemoteThread
ResumeThread
SuspendThread
WaitForMultipleObjects
ExitThread
SetThreadContext
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeA
FlushFileBuffers
GetConsoleMode
GetThreadContext
GetConsoleCP
IsValidCodePage
GetOEMCP
WriteProcessMemory
GetACP
HeapCreate
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
CreateFileW
GetModuleHandleW
GetCurrentProcess
VirtualAllocEx
VirtualAlloc
OpenMutexW
GetLastError
CloseHandle
CreateMutexW
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
SetFilePointer
GetSystemInfo
GetModuleHandleA
VirtualFree
user32
OpenDesktopW
GetWindowThreadProcessId
FindWindowExW
GetAsyncKeyState
wsprintfW
GetThreadDesktop
SetThreadDesktop
FindWindowW
advapi32
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
CreateProcessAsUserW
shell32
ShellExecuteW
ShellExecuteExW
oleaut32
VariantClear
shlwapi
PathFileExistsW
StrCmpIW
wininet
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
InternetConnectW
HttpOpenRequestW
InternetSetOptionA
InternetQueryOptionW
HttpSendRequestW
HttpQueryInfoW
psapi
GetModuleFileNameExW
ws2_32
socket
setsockopt
htons
inet_addr
sendto
recvfrom
ntohs
closesocket
inet_ntoa
ntohl
htonl
WSAJoinLeaf
gethostname
WSAStartup
WSASocketW
recv
send
gethostbyname
WSAConnect
bind
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
dnsapi
DnsFree
DnsQuery_W
iphlpapi
GetAdaptersInfo
SendARP
GetIpNetTable
Sections
.text Size: 211KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ