Behavioral task
behavioral1
Sample
b870952220f1c85188365a725cf6c7b9d1e80e5c2b18187bd5706f4ac7acac9b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b870952220f1c85188365a725cf6c7b9d1e80e5c2b18187bd5706f4ac7acac9b.exe
Resource
win10v2004-20220812-en
General
-
Target
b870952220f1c85188365a725cf6c7b9d1e80e5c2b18187bd5706f4ac7acac9b
-
Size
342KB
-
MD5
6de0843f55fb63a447bb6f4a8bfc5a10
-
SHA1
f35c4092662f264df68f62ae8603612bc774d2cf
-
SHA256
b870952220f1c85188365a725cf6c7b9d1e80e5c2b18187bd5706f4ac7acac9b
-
SHA512
e959cbbd861bbf106adfe5d3f5dc71fd07dbb753d7e7c9bdd17183e19f91449a40acaf62cb8623c193acdccf1e63cb10e907ebbb00cd775c6b5aea16d71bb01d
-
SSDEEP
6144:awl5FVbGly76bVln7sHJnwkBYK5Tz77uCYXilJbg5sX+6vVoj:HlZbylVln7spxYK5/7+XSbOYo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b870952220f1c85188365a725cf6c7b9d1e80e5c2b18187bd5706f4ac7acac9b.exe windows x86
12a7de265887ccf463fc183fd8d4696c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
lstrlenA
WideCharToMultiByte
CompareStringA
CompareStringW
GetVersionExA
DeleteFileA
GetTempPathA
GetWindowsDirectoryA
GetTickCount
GetFileAttributesA
GetTempFileNameA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
lstrcpyA
LockResource
LoadResource
FindResourceA
GetModuleHandleA
SetErrorMode
FreeLibrary
RemoveDirectoryA
LeaveCriticalSection
EnterCriticalSection
CreateThread
CreateMutexA
WaitForSingleObject
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
SetEvent
OpenEventA
GetLastError
GetCurrentThreadId
HeapAlloc
GetSystemInfo
HeapCreate
lstrcpynA
lstrcatA
WritePrivateProfileStringA
FindClose
FindFirstFileA
SetFilePointer
GetShortPathNameA
GetProcAddress
LoadLibraryA
GetFileSize
GetSystemDefaultLangID
MoveFileA
FindResourceExA
HeapDestroy
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SizeofResource
GetStartupInfoA
ExitProcess
GetCommandLineA
DebugBreak
HeapReAlloc
HeapFree
VirtualQuery
VirtualProtect
SearchPathA
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcmpA
SetLastError
GetCurrentThread
GetVersion
IsBadReadPtr
lstrcmpiA
GetPrivateProfileIntA
GetPrivateProfileStringA
MultiByteToWideChar
ReadFile
Sleep
WriteFile
CloseHandle
CreateEventA
QueryPerformanceFrequency
InterlockedDecrement
InterlockedIncrement
CreateFileA
GetModuleFileNameA
CreateDirectoryA
CreateProcessA
GetCurrentProcess
user32
MsgWaitForMultipleObjects
LoadStringA
CharNextA
MessageBoxA
CharLowerBuffA
ScreenToClient
MoveWindow
KillTimer
DestroyWindow
GetWindowTextA
SetTimer
SetWindowRgn
PeekMessageA
SetActiveWindow
ShowWindow
EndDialog
SetWindowTextA
GetDlgItem
SendMessageA
SetDlgItemTextA
LoadIconA
GetWindowRect
SystemParametersInfoA
SetWindowPos
wsprintfA
GetDesktopWindow
CharUpperA
PostThreadMessageA
CreateDialogIndirectParamA
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetDC
DialogBoxIndirectParamA
ReleaseDC
gdi32
DeleteObject
GetObjectA
CreateFontIndirectA
LPtoDP
GetTextExtentPoint32A
advapi32
RegEnumKeyExA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
OpenThreadToken
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
FreeSid
EqualSid
ole32
CoTaskMemFree
StringFromGUID2
GetRunningObjectTable
CoCreateGuid
CoMarshalInterThreadInterfaceInStream
CoReleaseMarshalData
CoInitialize
CoGetInterfaceAndReleaseStream
CoUninitialize
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemAlloc
StringFromCLSID
oleaut32
SysFreeString
SysAllocString
SysAllocStringLen
VariantCopy
VariantClear
LoadRegTypeLi
LoadTypeLi
RegisterTypeLi
SysStringLen
lz32
LZCopy
LZOpenFileA
LZClose
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 239KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE