Behavioral task
behavioral1
Sample
58d17415af75d0bfdb518ab3dd8a43c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
58d17415af75d0bfdb518ab3dd8a43c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
58d17415af75d0bfdb518ab3dd8a43c0N.exe
-
Size
404KB
-
MD5
58d17415af75d0bfdb518ab3dd8a43c0
-
SHA1
7edd5ae3c02b896c3c80ff5e425c7be12827a87e
-
SHA256
da424e4bad390bd9b04a9c8b5992fbd1832507d33c31e9fc0d81e7a9e168f332
-
SHA512
1c24d83c4b7684a5ebfb05d0c0134c61c5853724da4de4583cf2c4bd9e9febbf244d30d53585e9e861cb52ffce0a0e22bce3c74063b5871d0ce2df8026073451
-
SSDEEP
6144:h/snirzx/eGS/dcy8rzCsITvqvxvKvKvLv8vtvHv3vyvxvyvEvPv6v4viMrDb:fx/XS/dWk
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 58d17415af75d0bfdb518ab3dd8a43c0N.exe
Files
-
58d17415af75d0bfdb518ab3dd8a43c0N.exe.exe windows:4 windows x86 arch:x86
fc198702036cad5d8f0b919a5d3f79c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrlenA
lstrcpyA
lstrcmpiA
WriteFile
WinExec
WaitForSingleObject
UnmapViewOfFile
TerminateProcess
Sleep
SizeofResource
SetFileAttributesA
SetErrorMode
SetEndOfFile
OpenProcess
OpenMutexA
MultiByteToWideChar
MoveFileExA
MoveFileA
MapViewOfFile
LockResource
LoadResource
LoadLibraryExA
LoadLibraryA
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetFileSize
GetFileAttributesA
GetDriveTypeA
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
FreeResource
FreeLibrary
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
DuplicateHandle
DeviceIoControl
DeleteFileA
CreateThread
CreateMutexA
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
MultiByteToWideChar
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetNamedSecurityInfoW
iphlpapi
GetAdaptersInfo
ntdll
ZwLoadDriver
RtlInitUnicodeString
ZwQuerySystemInformation
oleaut32
SysFreeString
SysAllocStringLen
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHChangeNotify
user32
TranslateMessage
SetTimer
SendMessageA
GetWindowThreadProcessId
GetMessageA
FindWindowExA
FindWindowA
DispatchMessageA
CharUpperBuffA
GetKeyboardType
MessageBoxA
CharNextA
Sections
UPX0 Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE