Behavioral task
behavioral1
Sample
3f5f7883f7341089d0c108381a72b141841b4ed6c8ba7f048a723e56ee7e7e18.exe
Resource
win7-20240903-en
General
-
Target
3f5f7883f7341089d0c108381a72b141841b4ed6c8ba7f048a723e56ee7e7e18
-
Size
392KB
-
MD5
c59a7a48ddbf4dfbff12dfcac552eaec
-
SHA1
a65f82e74b208037cd3d8e43a4ad3ea94cb7fabc
-
SHA256
3f5f7883f7341089d0c108381a72b141841b4ed6c8ba7f048a723e56ee7e7e18
-
SHA512
cf33e7824ce3182f896588a2fb35e7e5f9543c1358d45ba3f655deafd866547ba4b2890d8240265615a8f312df3bfe671882bddb14732e4ed60a7333da4de449
-
SSDEEP
6144:ySqjfrzexKJ04rDCKJ04rDC0J04rDC8J04rDCuP:2jKKjCKjC0jC8jC
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f5f7883f7341089d0c108381a72b141841b4ed6c8ba7f048a723e56ee7e7e18
Files
-
3f5f7883f7341089d0c108381a72b141841b4ed6c8ba7f048a723e56ee7e7e18.exe windows:4 windows x86 arch:x86
dcc0c8a41c08f8c17dea2f8dfed642d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrlenA
lstrcpyA
lstrcmpiA
WriteFile
WinExec
WaitForSingleObject
Sleep
SizeofResource
SetFileAttributesA
SetErrorMode
SetEndOfFile
OpenProcess
OpenMutexA
MoveFileExA
MoveFileA
LockResource
LoadResource
LoadLibraryExA
LoadLibraryA
GetWindowsDirectoryA
GetVersionExA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetFileSize
GetFileAttributesA
GetDriveTypeA
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
FreeResource
FreeLibrary
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
DuplicateHandle
DeviceIoControl
DeleteFileA
CreateThread
CreateMutexA
CreateFileA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
MultiByteToWideChar
GetThreadLocale
GetStartupInfoA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenServiceA
OpenSCManagerA
ControlService
CloseServiceHandle
ntdll
ZwLoadDriver
RtlInitUnicodeString
ZwQuerySystemInformation
oleaut32
SysFreeString
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHChangeNotify
user32
TranslateMessage
SetTimer
SendMessageA
KillTimer
GetWindowThreadProcessId
GetMessageA
FindWindowExA
FindWindowA
DispatchMessageA
CharUpperBuffA
GetKeyboardType
MessageBoxA
Sections
UPX0 Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE