General
-
Target
DisableLogonUI.exe
-
Size
45KB
-
MD5
9331642986fab172bd242e5891580e27
-
SHA1
7cb5493fc05bd8537f9e22c9d697507af6496aa9
-
SHA256
b1c29c7d6a5c173e25aec1e3661eea4a40c5c6b0de2de3195f11324c023c3fb8
-
SHA512
71551b6e862f65daed6f187861e59a0e5fcedcf05c4ae7f0f6cc77acff87762156f43ba7e2c4ffc3f3cd5278b2e51dc3a67b3b01bd23dc19766ac8e5f5b9b17c
-
SSDEEP
768:Hpm7BcEKNvBcvL6VeRNL1a6ZO4PTPz+o+CKr3zQ4NuVVWgP4+zSmjanbcuyD7U/t:HpfEKNCj6VoJl9Go5K7s4Nu3unouy8db
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource DisableLogonUI.exe
Files
-
DisableLogonUI.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE