C:\exe.pdb
Behavioral task
behavioral1
Sample
90269e77301f424a6fe1afcce32e3a20N.exe
Resource
win7-20240708-en
General
-
Target
90269e77301f424a6fe1afcce32e3a20N.exe
-
Size
243KB
-
MD5
90269e77301f424a6fe1afcce32e3a20
-
SHA1
88617b171a6e73a16d34300f693c62b1c673034b
-
SHA256
bcff91acbe137061c089499b61ce4f3782069f9b96a8e909052db37973147e15
-
SHA512
df22ead50edc93e7de41cb1704da28ecf05a1069a4b0526f08349595a93747def80d035e85d943530cb5c857e56296d68d979f54a18ef4b295db75ed35bb2847
-
SSDEEP
6144:u2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:u2EB0NxDIBuOFe7/uT
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90269e77301f424a6fe1afcce32e3a20N.exe
Files
-
90269e77301f424a6fe1afcce32e3a20N.exe.exe windows:5 windows x86 arch:x86
7855ad517ce65828b23df55d68d6c927
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
strstr
strlen
??2@YAPAXI@Z
strrchr
??3@YAXPAX@Z
srand
rand
memset
memcpy
_except_handler3
ntdll
ZwQueryInformationThread
shlwapi
PathFileExistsA
SHDeleteKeyA
psapi
GetModuleInformation
ws2_32
connect
gethostbyname
WSAResetEvent
socket
inet_addr
send
WSAAddressToStringA
WSAStartup
getaddrinfo
WSACleanup
freeaddrinfo
closesocket
htons
WSACreateEvent
bind
sendto
WSAGetLastError
WSARecvFrom
setsockopt
gethostname
iphlpapi
GetAdaptersInfo
wintrust
WinVerifyTrust
mpr
WNetOpenEnumA
WNetCloseEnum
WNetAddConnection2A
WNetCancelConnection2A
rpcrt4
UuidToStringA
UuidFromStringA
kernel32
GetExitCodeProcess
FindFirstFileA
GetLogicalDriveStringsA
RemoveDirectoryA
FindClose
FindNextFileA
MoveFileExA
SetNamedPipeHandleState
OpenThread
CreateNamedPipeA
FlushFileBuffers
DisconnectNamedPipe
Thread32Next
ConnectNamedPipe
GetCurrentProcess
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
GetLogicalDrives
GetCurrentProcessId
FlushViewOfFile
MultiByteToWideChar
GetLocalTime
GlobalFree
GetDriveTypeA
lstrcpynA
DeviceIoControl
GetSystemDirectoryA
TerminateProcess
GlobalAlloc
TransactNamedPipe
GetExitCodeThread
CreateFileA
FindResourceA
FreeResource
lstrlenA
FreeLibrary
Process32First
GetTickCount
WriteFile
Sleep
SizeofResource
ReadFile
lstrcmpiA
GetProcAddress
Process32Next
LockResource
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
CreateToolhelp32Snapshot
CloseHandle
GetSystemTime
DeleteFileA
lstrcpyA
ExitProcess
GetFileSize
SetFilePointer
VirtualQuery
SetEndOfFile
SetFileTime
GetWindowsDirectoryA
CreateProcessA
LoadLibraryA
GetFileTime
GetCurrentThreadId
GetTempPathA
WaitForSingleObject
SetEvent
CreateEventA
GetLastError
MapViewOfFile
UnmapViewOfFile
OpenProcess
ExitThread
CopyFileA
CreateFileMappingA
WinExec
GetVersion
CreateThread
lstrcatA
TerminateThread
user32
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetMessageA
wsprintfA
GetInputState
PostThreadMessageA
advapi32
CloseServiceHandle
QueryServiceStatus
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenServiceA
OpenSCManagerA
RegQueryValueExA
CreateServiceA
StartServiceA
OpenProcessToken
CreateProcessAsUserA
ControlService
RegCreateKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE