Behavioral task
behavioral1
Sample
f292d219cf448030b6e798a4df9b1577d9d6eeb07679d550477ceb9645382e94N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f292d219cf448030b6e798a4df9b1577d9d6eeb07679d550477ceb9645382e94N.exe
Resource
win10v2004-20240802-en
General
-
Target
f292d219cf448030b6e798a4df9b1577d9d6eeb07679d550477ceb9645382e94N
-
Size
264KB
-
MD5
f4ecfb3c1ce8609f72146768c74bf9d0
-
SHA1
d0abb6284afb080c34d15b21a98ed4f5936db0a0
-
SHA256
f292d219cf448030b6e798a4df9b1577d9d6eeb07679d550477ceb9645382e94
-
SHA512
72e5bf55449be5b8fb6f08c098e98d1200f75b39b8299877cee4f9f9f88c21c90b6281e1832e49a0b128f88e25f20d29c917e6914d7979341579123ddc63dbba
-
SSDEEP
3072:GC+aMOcklEV3wHNhX8JMfNJJoGoDe7egLOoV25Nz3hHqGhGVz+rEMSQJBWIMSC/Y:GC74OEVMhAebSMGhuirTJwGYc8HACM
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f292d219cf448030b6e798a4df9b1577d9d6eeb07679d550477ceb9645382e94N
Files
-
f292d219cf448030b6e798a4df9b1577d9d6eeb07679d550477ceb9645382e94N.exe windows:4 windows x86 arch:x86
5ba9ff436ab57cb85d87281be20da78f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
RtlUnwind
GetStartupInfoA
GetCommandLineA
RaiseException
HeapAlloc
HeapFree
TerminateProcess
HeapSize
HeapReAlloc
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
WriteFile
GetCurrentProcess
SetErrorMode
SizeofResource
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
lstrcpynA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
GlobalFree
GlobalAlloc
lstrcmpA
GetCurrentThread
GlobalLock
GlobalUnlock
MulDiv
GetProfileStringA
FindResourceA
LoadResource
LockResource
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
ExitProcess
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
WaitForSingleObjectEx
SetEvent
WaitForSingleObject
TerminateThread
CreateThread
SetThreadPriority
CreateEventA
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
LocalAlloc
LocalFree
SetLastError
DeviceIoControl
CloseHandle
CreateFileA
LeaveCriticalSection
EnterCriticalSection
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
user32
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
ShowWindow
IsWindowEnabled
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
SetCursor
GetCursorPos
ValidateRect
GetActiveWindow
TranslateMessage
GetMessageA
CreateDialogIndirectParamA
EndDialog
LoadStringA
DestroyMenu
GetClassNameA
PtInRect
GetSysColorBrush
MapWindowPoints
GetSysColor
DispatchMessageA
GetFocus
SetActiveWindow
IsWindow
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
IsWindowVisible
ScrollWindow
GetTopWindow
MessageBoxA
GetParent
GetCapture
WinHelpA
GetClassInfoA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
SetWindowsHookExA
CallNextHookEx
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
PostQuitMessage
IsIconic
GetSystemMetrics
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
wsprintfA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
InvalidateRect
DefDlgProcA
DefWindowProcA
DestroyWindow
CreateWindowExA
PeekMessageA
PostMessageA
EnableWindow
UpdateWindow
GetClientRect
LoadCursorA
SendDlgItemMessageA
RegisterClassA
UnregisterClassA
GetClassLongA
IsWindowUnicode
CharNextA
InflateRect
gdi32
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
MoveToEx
LineTo
GetObjectA
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
BitBlt
CreateCompatibleDC
SetBkColor
SetTextColor
GetClipBox
CreatePen
SelectObject
PatBlt
GetTextExtentPointA
CreateDIBitmap
GetStockObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
comctl32
ord17
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE