Behavioral task
behavioral1
Sample
1be63a9eff443f4093bc6b82671f8d287c4ece49b44ef762670432a08388e5ff.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1be63a9eff443f4093bc6b82671f8d287c4ece49b44ef762670432a08388e5ff.exe
Resource
win10v2004-20240508-en
General
-
Target
1be63a9eff443f4093bc6b82671f8d287c4ece49b44ef762670432a08388e5ff
-
Size
432KB
-
MD5
783a629a32eefec4775465aa624c3846
-
SHA1
6ea9bbc2de63075d92012ea2ddc0bb88fc54273d
-
SHA256
1be63a9eff443f4093bc6b82671f8d287c4ece49b44ef762670432a08388e5ff
-
SHA512
8e2848ca16f9c2abaebc3d52d2716d86f3e9e47d54ded3cb9adf4ec638e501a549539b291c65c76e5c984df14ec33cf5640980db1f14e323bccd9c3a1055e4cb
-
SSDEEP
3072:wdu5uDQ70tnP5I09qgmBBAWgjSvwF3E7WmCX4q:SDK0tna2qgmBNgQw3
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1be63a9eff443f4093bc6b82671f8d287c4ece49b44ef762670432a08388e5ff
Files
-
1be63a9eff443f4093bc6b82671f8d287c4ece49b44ef762670432a08388e5ff.exe windows:4 windows x86 arch:x86
f0a8f5b2a0397046143edde10ffcb1a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetSystemTime
MultiByteToWideChar
GetLocaleInfoA
GetModuleHandleA
FindNextFileA
FindFirstFileA
FlushFileBuffers
SetStdHandle
FindClose
Sleep
SetFilePointer
LCMapStringW
LCMapStringA
GetStringTypeW
ExitProcess
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
IsBadWritePtr
IsBadReadPtr
HeapValidate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
SetConsoleCtrlHandler
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
CloseHandle
advapi32
GetUserNameW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
user32
MessageBoxA
Sections
UPX0 Size: 312KB - Virtual size: 312KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE