Behavioral task
behavioral1
Sample
92e4932108fa2ae9e875c05f7136067283a0d0b69f94073714ba1b162607c6d4.exe
Resource
win7-20240903-en
General
-
Target
92e4932108fa2ae9e875c05f7136067283a0d0b69f94073714ba1b162607c6d4
-
Size
200KB
-
MD5
965f6ff26df1295e50dae4eabf02995e
-
SHA1
ee057dfdc2e4d18015a319b80936ced094a39cd4
-
SHA256
92e4932108fa2ae9e875c05f7136067283a0d0b69f94073714ba1b162607c6d4
-
SHA512
fd34bc7c804ab35d63be7da3ab82c71c6303a1fb8b6e53b536c5f95d87297cc25c03908900b30fd3d9771b7f2b17b181cfbc0a366e82a1bb84e62fde4638f327
-
SSDEEP
1536:jNfU27ZMsDh/nRurug1JKxBTGYjuDwgv/RYu1BJsPLUIG7TvFiClXbfUjX:j+27ZfF/0D1JKDTRgvJY7UIQ/s
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 92e4932108fa2ae9e875c05f7136067283a0d0b69f94073714ba1b162607c6d4
Files
-
92e4932108fa2ae9e875c05f7136067283a0d0b69f94073714ba1b162607c6d4.exe windows:6 windows x86 arch:x86
eb32b05c5227fdd7f80f31c0dbad267c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
CreateDirectoryA
SetCurrentDirectoryA
ExitProcess
GetLastError
VirtualAlloc
GetShortPathNameW
WaitForMultipleObjects
CloseHandle
GetThreadLocale
GetCurrentDirectoryA
GetLocaleInfoA
GetModuleFileNameA
CreateEventA
GetACP
GetExitCodeProcess
InterlockedExchange
GetVersionExA
CreateMutexA
GetTickCount
QueryPerformanceCounter
comdlg32
GetOpenFileNameA
shell32
DragQueryFileW
DragFinish
DragQueryFileA
StrChrW
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetMalloc
ShellExecuteW
SHGetPathFromIDListA
SHGetFileInfoW
Shell_NotifyIconA
ShellExecuteA
shlwapi
PathIsDirectoryA
user32
GetForegroundWindow
PostQuitMessage
GetWindowRect
GetSystemMetrics
CharLowerA
GetWindowThreadProcessId
IsWindowVisible
SendMessageTimeoutA
IsWindow
EnumWindows
CharLowerW
GetMenuItemCount
SetMenuDefaultItem
GetWindowLongA
SendMessageW
GetSubMenu
RegisterWindowMessageA
LoadIconA
SendMessageA
InsertMenuA
GetWindowTextA
PostMessageA
GetDesktopWindow
CharUpperW
IsIconic
DestroyIcon
ClientToScreen
GetClientRect
KillTimer
EnumChildWindows
CreatePopupMenu
UnregisterClassA
CopyRect
SetMenuItemBitmaps
DrawIcon
SetForegroundWindow
GetCursorPos
TrackPopupMenu
LoadImageA
CharUpperA
ModifyMenuA
LoadMenuA
Sections
UPX0 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE