Behavioral task
behavioral1
Sample
97830820a518c67bf032573aa0785d830f648ceb2ad777868b32fd1ce0c73a6c.exe
Resource
win7-20240729-en
General
-
Target
97830820a518c67bf032573aa0785d830f648ceb2ad777868b32fd1ce0c73a6c.exe
-
Size
269KB
-
MD5
6d8449c2edc6ebc329b915f1ebe99c50
-
SHA1
3a3f2e0f3f4304291353560690543fa99d02b2d7
-
SHA256
97830820a518c67bf032573aa0785d830f648ceb2ad777868b32fd1ce0c73a6c
-
SHA512
04752d87067e2dee361e8ba12caccc407dd62c3cc2f95801e3e832c6f29107c5b189ed3030a745e962919629629ef53893e13cd5ba9df3adb9c310e1ce5f998b
-
SSDEEP
3072:iAn6oNA5f/hK9eb+iY86PLJ83pBw0q6FjctDuFbIbXuUZayuNmhofrwr2LDDHytW:iA6aAv+5iYPEzF0ZZay/ofrwr0DDHC23
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97830820a518c67bf032573aa0785d830f648ceb2ad777868b32fd1ce0c73a6c.exe
Files
-
97830820a518c67bf032573aa0785d830f648ceb2ad777868b32fd1ce0c73a6c.exe.exe windows:4 windows x86 arch:x86
98fd8531e35ad97105c4cde0485643dc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
WaitForMultipleObjects
LocalFree
LocalAlloc
SetEvent
CreateEventW
InitializeCriticalSection
GetFileAttributesW
GetCurrentProcess
MoveFileW
SetErrorMode
WaitForSingleObject
GetSystemInfo
QueryPerformanceFrequency
GetModuleHandleW
GetTickCount
GetModuleFileNameW
OpenEventW
Sleep
LoadLibraryW
FreeLibrary
GetLastError
GetVersionExW
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
RaiseException
LoadLibraryA
lstrcmpW
GetProcAddress
advapi32
SetThreadToken
ImpersonateLoggedOnUser
RevertToSelf
QueryServiceConfigW
CreateServiceW
ChangeServiceConfigW
DeleteService
OpenSCManagerW
OpenServiceW
QueryServiceStatus
StartServiceW
ControlService
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
SetServiceStatus
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
DuplicateTokenEx
loadperf
SetServiceAsTrustedW
UpdatePerfNameFilesW
SetServiceAsTrustedA
kbdest
KbdLayerDescriptor
Sections
UPX1 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.yNSNYs Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Qg Size: 4KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.GVtccp Size: 4KB - Virtual size: 445KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 90KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.acwcX Size: 1024B - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 128KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.WjOb Size: 1KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ