Behavioral task
behavioral1
Sample
a7ed22c55361932df7feacf9091a11fa6d83c653210cc94380a82212bb13acc6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7ed22c55361932df7feacf9091a11fa6d83c653210cc94380a82212bb13acc6.exe
Resource
win10v2004-20220812-en
General
-
Target
a7ed22c55361932df7feacf9091a11fa6d83c653210cc94380a82212bb13acc6
-
Size
558KB
-
MD5
663b1bd50060b59e412f2e3a6006e733
-
SHA1
e72a7978217d089a79650f0f5b04eb6d9201867a
-
SHA256
a7ed22c55361932df7feacf9091a11fa6d83c653210cc94380a82212bb13acc6
-
SHA512
1a72bad72e54dffe6a4e0c921a52762e904dba8946f65173119b2e2a81ea083a36195a26ac7a7ade10b7d9b6a736b4e0f9a15fae2b4e1eb8a0b3fa099a948331
-
SSDEEP
12288:kgsC4+e7m9I9p5B+5dJH3LtaWxSM+vLQ3yuogA4Py6wn2:BPh0pL+5dVMpv83eoPy6M
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a7ed22c55361932df7feacf9091a11fa6d83c653210cc94380a82212bb13acc6.exe windows x86
62ea002873d0e4b10d2d40a1b8911524
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
wininet
InternetConnectW
version
GetFileVersionInfoW
setupapi
SetupDiDestroyDeviceInfoList
ddraw
DirectDrawCreateEx
user32
PostQuitMessage
gdi32
SetViewportExtEx
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
advapi32
SetSecurityDescriptorOwner
shell32
Shell_NotifyIconW
comctl32
_TrackMouseEvent
shlwapi
PathFileExistsW
ole32
CoCreateInstance
oleaut32
VariantClear
winmm
timeGetTime
Sections
.MyCrack Size: 461KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE