Behavioral task
behavioral1
Sample
810ad7c0596a1c89a8f7dc5734aa8cb3f0a7b11ef4c56cede2eabc2bf3830f0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
810ad7c0596a1c89a8f7dc5734aa8cb3f0a7b11ef4c56cede2eabc2bf3830f0b.exe
Resource
win10v2004-20220901-en
General
-
Target
810ad7c0596a1c89a8f7dc5734aa8cb3f0a7b11ef4c56cede2eabc2bf3830f0b
-
Size
176KB
-
MD5
51d9c3988e744d8e0e1cff34e5599534
-
SHA1
2500c4c9b4f292316d5d5f0de68f6d13cc3d5754
-
SHA256
810ad7c0596a1c89a8f7dc5734aa8cb3f0a7b11ef4c56cede2eabc2bf3830f0b
-
SHA512
8599ce1e600e43ae79b0b80ff4b3eb92e0800ba922d9594d7943fb1416a824438d6fd79dc36eccf4946538a5190f5d90f31f6827b5665cfa86a139a1e8b013cf
-
SSDEEP
1536:QEgl4N1LFSZI3dcuATDpDjWGJs2gnN8HBgd7Wv7HAAwPsqhAJRJ82Et661hp:Q32NvSWZCFj14+aKv7HAAwPslqn
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
810ad7c0596a1c89a8f7dc5734aa8cb3f0a7b11ef4c56cede2eabc2bf3830f0b.exe windows x86
16b76f217a29f5fdcfa1f522aadc7751
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNamedPipeHandleStateA
GetProcessTimes
ScrollConsoleScreenBufferW
lstrcpyA
VirtualAlloc
PrepareTape
AddAtomW
CmdBatNotification
LoadLibraryExW
IsBadHugeReadPtr
GetFileType
GetCommModemStatus
GetStdHandle
GlobalUnWire
SetThreadAffinityMask
SetConsoleKeyShortcuts
GetThreadTimes
GetLogicalDriveStringsA
FreeLibrary
IsBadReadPtr
OpenWaitableTimerW
_lwrite
GetProfileStringW
EnumSystemLocalesW
RtlFillMemory
GetConsoleCommandHistoryA
SetConsoleInputExeNameW
SetConsoleWindowInfo
GetPrivateProfileStructW
GlobalHandle
SetConsoleScreenBufferSize
GetNumberOfConsoleFonts
DisconnectNamedPipe
SystemTimeToTzSpecificLocalTime
gdi32
GetPixel
StrokeAndFillPath
GetPixelFormat
GetMetaRgn
SaveDC
SetMetaFileBitsEx
GdiSetServerAttr
CombineRgn
GetCharABCWidthsFloatA
SetPixelFormat
PtVisible
PlayMetaFile
BitBlt
GetObjectA
GetCharWidth32A
GdiSetPixelFormat
AbortPath
SetAbortProc
CreateHatchBrush
GetWindowExtEx
GetCharWidthA
CreateCompatibleDC
RemoveFontResourceW
EnumEnhMetaFile
CreateMetaFileA
CreateCompatibleBitmap
Rectangle
GdiEntry1
GetTextMetricsA
GetEnhMetaFilePixelFormat
SelectClipRgn
GetBitmapBits
AnimatePalette
GdiGetLocalBrush
CopyMetaFileW
LPtoDP
ole32
HPALETTE_UserSize
HACCEL_UserFree
CoInitializeWOW
OleConvertOLESTREAMToIStorageEx
IsValidInterface
HWND_UserFree
OleRegEnumFormatEtc
OleCreateLinkFromDataEx
StgCreateDocfile
CreateGenericComposite
UtGetDvtd32Info
STGMEDIUM_UserMarshal
user32
SetCursor
TileWindows
GetClassNameW
SetWindowsHookA
IsDialogMessageA
DeleteMenu
TrackPopupMenuEx
InternalGetWindowText
CharToOemBuffA
ChangeMenuW
CharPrevA
IsWindowEnabled
SetWindowStationUser
DdeUnaccessData
GetWindowRgn
DdeAccessData
InvalidateRect
CascadeChildWindows
DlgDirListW
UnlockWindowStation
TabbedTextOutA
TranslateAcceleratorW
SetWindowContextHelpId
GetKeyNameTextA
CharNextW
WaitForInputIdle
Sections
UPX0 Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE