Static task
static1
Behavioral task
behavioral1
Sample
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db.exe
Resource
win10v2004-20240508-en
General
-
Target
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db
-
Size
106KB
-
MD5
b06c811554508247282dc00b7a82b0ef
-
SHA1
1574070e54ae15a93b8a9ecd4a40a98cfb2f1a71
-
SHA256
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db
-
SHA512
f9f1f1c75ac472e4167ecba2811eae3b66c7023bd9257c310e2469be8b796010cb0657244640e2525f46464cee894bef87d284fb02b5ee3439d3f23ab45a8c6e
-
SSDEEP
3072:GmqRL49gVu4HLM2daP8NJYHttq9iZLSHdUvynNe9nLsZ:GbeIM4/JY7q9SLS9Eynw9nL
Malware Config
Signatures
-
Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db
Files
-
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ