Behavioral task
behavioral1
Sample
3371db9cf53958c2c66a980258986706fbd9e4667f4f99c42b606d159e2b4900.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3371db9cf53958c2c66a980258986706fbd9e4667f4f99c42b606d159e2b4900.exe
Resource
win10v2004-20220901-en
General
-
Target
3371db9cf53958c2c66a980258986706fbd9e4667f4f99c42b606d159e2b4900
-
Size
271KB
-
MD5
795cb100f49366d144f36061f2d475cf
-
SHA1
7854bde8eb3a201f9c908e67652c2bbd16ec35ec
-
SHA256
3371db9cf53958c2c66a980258986706fbd9e4667f4f99c42b606d159e2b4900
-
SHA512
003264906e6d615e574dc02cd75e56b8562ff61d804397fff78321361726f664f48fece759796029304b276a3237dbafb460271b6c3563cdbb037bbf01b6b172
-
SSDEEP
6144:2vRoBWKDgxlDJjLzrXK0nk5SJfnsNjeDER:2ZqpgTdfP0anQeDE
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3371db9cf53958c2c66a980258986706fbd9e4667f4f99c42b606d159e2b4900.exe windows x86
698ec3f848d4ffbe9eee819103c543b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeThread
TerminateThread
CreateThread
DeleteFileA
SetEvent
SetErrorMode
SetUnhandledExceptionFilter
GetModuleHandleA
GetLocalTime
TerminateProcess
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
RaiseException
CreateFileA
GetLastError
GetCommandLineA
GetCurrentDirectoryA
WriteFile
FreeEnvironmentStringsA
lstrlenA
GetEnvironmentStrings
GetSystemDefaultLCID
GetUserDefaultLCID
GetSystemDefaultLangID
GetModuleFileNameA
GetOEMCP
GetACP
GetSystemDirectoryA
GetWindowsDirectoryA
lstrcmpiA
GetVersionExA
OpenProcess
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
LocalFree
GlobalUnlock
LocalLock
LocalAlloc
FileTimeToSystemTime
GetThreadTimes
VirtualQuery
GetCurrentThread
VirtualProtect
InitializeCriticalSection
GetProcAddress
LoadLibraryA
FreeLibrary
CreateEventA
WaitForSingleObject
GetUserDefaultLangID
CloseHandle
GetProcessHeap
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetModuleHandleW
Sleep
ExitProcess
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
HeapFree
HeapAlloc
UnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetStdHandle
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetStartupInfoA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetFilePointer
MultiByteToWideChar
ReadFile
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
IsValidCodePage
GetLocaleInfoW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
user32
GetDC
ReleaseDC
MessageBoxA
GetSystemMetrics
gdi32
GetDeviceCaps
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetUserNameA
shlwapi
PathFileExistsA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE