Behavioral task
behavioral1
Sample
7ac1f82e13bc07e865ae9253f1103c421f19a813694eb6925699749d42f25e3aN.exe
Resource
win7-20240903-en
General
-
Target
7ac1f82e13bc07e865ae9253f1103c421f19a813694eb6925699749d42f25e3aN
-
Size
224KB
-
MD5
15352b19d8d1eaa97a132ace97ba2340
-
SHA1
8f0ab6f17cde7a4e0d4c7cfef320ea1dc893c010
-
SHA256
7ac1f82e13bc07e865ae9253f1103c421f19a813694eb6925699749d42f25e3a
-
SHA512
6e3ae092760c8d5b0032d1929f01c99b51e769ecd262792fe41742cc14ec597bfe301d4e06099929ee0baf5486cce2c622c69a51b20b0891c744f90fffcbede7
-
SSDEEP
768:7b1xZOSqk2CAVszyJ26Cpc9w7r3AljdBeUl1tGNmmUwHcwnOtrFI:7rMSq9CAVs22WO3cCUlG8AHcWOhi
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ac1f82e13bc07e865ae9253f1103c421f19a813694eb6925699749d42f25e3aN
Files
-
7ac1f82e13bc07e865ae9253f1103c421f19a813694eb6925699749d42f25e3aN.exe windows:4 windows x86 arch:x86
b7657d7c05b88926b8f139e362bfdf7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrlenA
TerminateProcess
OpenProcess
GetVersionExA
GetSystemDefaultLCID
GetProcAddress
GetModuleHandleA
FreeLibrary
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetCurrentThreadId
GetStartupInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
advapi32
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
comctl32
InitCommonControls
gdi32
SetTextColor
SetROP2
SetBrushOrgEx
SetBkMode
SetBkColor
SelectObject
MoveToEx
GetTextExtentPoint32A
GetStockObject
DeleteObject
DeleteDC
CreateSolidBrush
CreateFontIndirectA
CreateCompatibleDC
shell32
ShellExecuteA
user32
WaitMessage
UnloadKeyboardLayout
TranslateMessage
ShowWindow
SetWindowTextA
SetWindowPos
SetWindowLongA
SetPropA
SetForegroundWindow
SetFocus
SetCursor
SendMessageA
RemovePropA
ReleaseDC
RegisterClassA
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
MessageBoxA
LoadKeyboardLayoutA
LoadIconA
LoadCursorA
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
InvalidateRect
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetSystemMetrics
GetSysColor
GetPropA
GetParent
GetWindow
GetKeyboardLayoutList
GetKeyState
GetFocus
GetDC
GetClientRect
GetClassInfoA
GetCapture
GetAsyncKeyState
GetActiveWindow
FillRect
EnableWindow
DispatchMessageA
DestroyWindow
DestroyIcon
DestroyAcceleratorTable
DefWindowProcA
CreateWindowExA
CopyImage
ClientToScreen
CheckRadioButton
CallWindowProcA
GetKeyboardType
MessageBoxA
Sections
UPX0 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE