Behavioral task
behavioral1
Sample
1638fac60d671c025b2ceacc46694c9e9075fd6b3f76b0c3ffcbed421f852051.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1638fac60d671c025b2ceacc46694c9e9075fd6b3f76b0c3ffcbed421f852051.exe
Resource
win10v2004-20240611-en
General
-
Target
1638fac60d671c025b2ceacc46694c9e9075fd6b3f76b0c3ffcbed421f852051.exe
-
Size
348KB
-
MD5
5acf686ea71a3beae85f1106be6ed1f0
-
SHA1
972a7660dc36864f29984ae72cb03555e76b4ec3
-
SHA256
1638fac60d671c025b2ceacc46694c9e9075fd6b3f76b0c3ffcbed421f852051
-
SHA512
4b3adf1672fcaccebb2c39cb67e70160608723c3b785f9f261acc6192def41d6ef7a94f0ae027e9c1b566d7073e7153e9f49e641cfb3e01d567dbf9591d69a86
-
SSDEEP
6144:hsdXFryQfP7nn+b0AgnaZI1DfdwX3MmIO+:hsdXFfP7nn+briDfOnMmX
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1638fac60d671c025b2ceacc46694c9e9075fd6b3f76b0c3ffcbed421f852051.exe
Files
-
1638fac60d671c025b2ceacc46694c9e9075fd6b3f76b0c3ffcbed421f852051.exe.exe windows:4 windows x86 arch:x86
4a85d3165f278469dc3d32b3d6dfcd9e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetLastError
AreFileApisANSI
FreeLibrary
LoadLibraryW
LoadLibraryA
GetModuleFileNameW
GetModuleFileNameA
LocalFree
FormatMessageW
FormatMessageA
GetSystemDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesW
SetFileAttributesA
RemoveDirectoryW
RemoveDirectoryA
GetProcAddress
GetModuleHandleW
CreateDirectoryW
CreateDirectoryA
DeleteFileW
DeleteFileA
SetCurrentDirectoryW
SetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentDirectoryA
GetTempPathW
GetTempPathA
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
FindClose
FindFirstFileW
FindFirstFileA
FindNextFileW
FindNextFileA
GetModuleHandleA
GetFileAttributesW
GetFileAttributesA
CreateFileA
GetFileSize
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
GetProcessAffinityMask
GetCurrentProcess
GetSystemInfo
GlobalMemoryStatus
GetStdHandle
GetFileInformationByHandle
WaitForMultipleObjects
Sleep
VirtualAlloc
VirtualFree
GetVersionExA
WaitForSingleObject
SetEvent
ResetEvent
CreateEventA
InitializeCriticalSection
CreateProcessA
GetCommandLineW
MapViewOfFile
CreateFileMappingA
RaiseException
InterlockedExchange
LocalAlloc
GetStartupInfoA
msvcrt
memcpy
_CxxThrowException
memmove
strstr
wcsstr
wcscmp
malloc
free
_beginthreadex
_except_handler3
wcsncpy
wcslen
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memcmp
_EH_prolog
__CxxFrameHandler
_purecall
Sections
UPX0 Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE