Behavioral task
behavioral1
Sample
eed5b2acf2241a4244edb8aa0261683d979e7893b79867cdb2ea4415fec7740c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eed5b2acf2241a4244edb8aa0261683d979e7893b79867cdb2ea4415fec7740c.exe
Resource
win10v2004-20240802-en
General
-
Target
eed5b2acf2241a4244edb8aa0261683d979e7893b79867cdb2ea4415fec7740c
-
Size
270KB
-
MD5
ccdc77b8c751c0ab4baef74f63dce86f
-
SHA1
0d27324664041ec7a416934e5831b6dda219922c
-
SHA256
eed5b2acf2241a4244edb8aa0261683d979e7893b79867cdb2ea4415fec7740c
-
SHA512
f1ca909f0002c4458ea2bd5896a3c078c15f3225efea18377825646763c86479afff41b80d788f9847380300c6244fe7d10f2209f40001a7182580380649a46c
-
SSDEEP
6144:/s+IN9RS6LTa9Ar37L2We1zwYVlEkdqY/nMmS6H5el8BJN:kHMwm9AHebVKkdrH5eyr
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eed5b2acf2241a4244edb8aa0261683d979e7893b79867cdb2ea4415fec7740c
Files
-
eed5b2acf2241a4244edb8aa0261683d979e7893b79867cdb2ea4415fec7740c.exe windows:4 windows x86 arch:x86
eacb494804cde55e7b0984642cfbc00b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
LoadLibraryW
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
Sleep
GetLastError
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
FreeLibrary
GetModuleHandleW
GetProcAddress
advapi32
OpenProcessToken
GetTokenInformation
msasn1
ASN1BEREncCheck
ASN1BEREncObjectIdentifier
ASN1CEREncMultibyteString
ASN1utf8string_free
ASN1BERDecS32Val
ASN1charstring_cmp
ASN1ztchar16string_free
ASN1BEREncChar32String
ASN1BERDecZeroChar16String
ASN1BEREncFlush
ASN1utctime_cmp
ASN1Free
ASN1uint32_uoctets
feclient
FeClientInitialize
Sections
UPX1 Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MZyHR Size: 2KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.OnCt Size: 5KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.p Size: 2KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lBfb Size: 4KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 75KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sRTyB Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 141KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cLqql Size: 4KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ