Behavioral task
behavioral1
Sample
0e4af5aad1f9ea32713c8434ec803f20N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0e4af5aad1f9ea32713c8434ec803f20N.exe
Resource
win10v2004-20240709-en
General
-
Target
0e4af5aad1f9ea32713c8434ec803f20N.exe
-
Size
220KB
-
MD5
0e4af5aad1f9ea32713c8434ec803f20
-
SHA1
bff43b855c6cc33199f72554a6935d7c9a59c70e
-
SHA256
e7d3ab1df95f93517b1b482ef9c04c8457a295aba4664a9b4457c7698907de05
-
SHA512
2b30eccf32a54813505e107fe7cef4cf6a9ce30a459703423e45c81315e085e0d32e6f21bb9f95b7ebd5598135e1189ec9929c868facc398b881e65311f98f60
-
SSDEEP
3072:07xOJb2kN3RDi/U8BG2Jk50LTub0FGH6AdGKbyTNFVyKtaAmx:OsnzRJbr6B
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e4af5aad1f9ea32713c8434ec803f20N.exe
Files
-
0e4af5aad1f9ea32713c8434ec803f20N.exe.exe windows:4 windows x86 arch:x86
5e0cf83862b63f38b998e0f120428ce2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapDestroy
GetEnvironmentVariableA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
MoveFileA
DeleteFileA
GetCurrentDirectoryA
SetEnvironmentVariableA
CreateDirectoryA
HeapFree
HeapAlloc
HeapCompact
TerminateProcess
ExitProcess
GetFileAttributesA
SetFileAttributesA
GetPrivateProfileStringA
GetVersion
GetVersionExA
GetModuleFileNameA
GetDriveTypeA
GetCurrentProcess
MoveFileExA
FormatMessageA
SetFileTime
WritePrivateProfileStringA
GetWindowsDirectoryA
GetSystemDirectoryA
GetLocalTime
GetFullPathNameA
FindFirstFileA
FindClose
MultiByteToWideChar
WideCharToMultiByte
GetTempPathA
GetStringTypeW
GetShortPathNameA
SetCurrentDirectoryA
GetExitCodeProcess
CreateProcessA
lstrcatA
lstrlenA
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
HeapCreate
GetLastError
advapi32
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegCloseKey
RegDeleteValueA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
comctl32
ord17
gdi32
CreatePalette
SetBkColor
ExtTextOutA
CreateFontIndirectA
GetSystemPaletteEntries
SetTextColor
SetBkMode
AddFontResourceA
RemoveFontResourceA
GetStockObject
GetDeviceCaps
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
RealizePalette
SelectPalette
CreateHalftonePalette
CreateDIBPatternBrush
CreateSolidBrush
StretchDIBits
SetStretchBltMode
SetBrushOrgEx
ole32
OleInitialize
CoCreateInstance
CoGetMalloc
OleUninitialize
shell32
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
user32
DialogBoxParamA
ExitWindowsEx
IsIconic
RedrawWindow
PostQuitMessage
DefWindowProcA
BringWindowToTop
PostMessageA
EndDialog
IsDlgButtonChecked
CheckDlgButton
SetTimer
GetDlgItemTextA
GetLastActivePopup
FindWindowA
RegisterClassA
LoadIconA
AdjustWindowRectEx
GetWindow
SendMessageA
GetSysColor
ScreenToClient
GetWindowRect
GetDlgItem
EndPaint
BeginPaint
GetClientRect
FillRect
SendDlgItemMessageA
CheckRadioButton
SetFocus
SetWindowTextA
GetParent
UpdateWindow
IsWindowVisible
InvalidateRect
CreateDialogParamA
TranslateMessage
DispatchMessageA
IsDialogMessageA
GetMessageA
SetDlgItemTextA
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExA
GetWindowLongA
IsWindowEnabled
EnableWindow
CallWindowProcA
ValidateRect
SetWindowLongA
GetClassNameA
MessageBoxA
PeekMessageA
wsprintfA
GetSystemMetrics
DrawTextA
LoadCursorA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
Sections
UPX0 Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE