Behavioral task
behavioral1
Sample
70924b71b1501ee27f23362309df2e139ab46b8047145fd50d822056abb5c653.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
70924b71b1501ee27f23362309df2e139ab46b8047145fd50d822056abb5c653.exe
Resource
win10v2004-20220812-en
General
-
Target
70924b71b1501ee27f23362309df2e139ab46b8047145fd50d822056abb5c653
-
Size
196KB
-
MD5
6e8631faeae511208ff7e3309942552d
-
SHA1
abdf0ea0b5ef6b2b2b0b7b1c5e2402306c8d05be
-
SHA256
70924b71b1501ee27f23362309df2e139ab46b8047145fd50d822056abb5c653
-
SHA512
31dcd933db90daba478f8ce35c902eb6febccad518d94c0867a5d312040c3cfa316dcc29b26d5f00a886bccc8ba6b5396187c0c41b7d6cd5c3cdcdd74faace14
-
SSDEEP
6144:edASMXW68KqQRz/Yv+O/I5w8qW/7uxnYNxfo:58KqQRz/Y4rpqJYNa
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
70924b71b1501ee27f23362309df2e139ab46b8047145fd50d822056abb5c653.exe windows x86
180da66498d17cf39dc4660da43dee0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExW
GetModuleBaseNameW
EnumProcessModules
comctl32
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_Create
ImageList_SetBkColor
ws2_32
send
recv
connect
htons
gethostbyname
socket
WSAStartup
shlwapi
StrStrA
PathRemoveExtensionW
PathStripPathW
SHDeleteKeyA
StrToIntA
wvnsprintfA
PathStripToRootW
PathIsDirectoryW
PathFindExtensionW
StrStrW
PathSkipRootW
PathRemoveFileSpecW
kernel32
Module32NextW
GetModuleFileNameW
Module32FirstW
Process32NextW
CreateThread
ExitProcess
CreateFileA
QueryDosDeviceA
CreateToolhelp32Snapshot
lstrcmpiW
GetCommandLineW
lstrlenW
lstrcpyA
LocalFree
GetProcAddress
LoadLibraryA
lstrcpyW
GetLongPathNameW
CloseHandle
ReadFile
CreateFileW
WriteFile
GetModuleHandleA
MultiByteToWideChar
GlobalAlloc
GlobalFree
lstrcmpA
GetFileAttributesW
RemoveDirectoryW
DeleteFileW
SetFileAttributesW
GetShortPathNameW
MoveFileW
GetVersionExA
GlobalUnlock
GlobalLock
GlobalReAlloc
FindClose
FindNextFileW
lstrcmpW
FindFirstFileW
lstrlenA
MoveFileExW
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
DuplicateHandle
GetCurrentProcess
TerminateProcess
Process32FirstW
user32
GetDlgItemTextW
DialogBoxParamA
wsprintfA
CharUpperW
SendDlgItemMessageA
UpdateWindow
InvalidateRect
ShowWindow
LoadIconA
MoveWindow
GetClientRect
ClientToScreen
GetDlgItem
CallWindowProcA
DestroyCursor
SetWindowLongA
SetCapture
SetCursor
LoadCursorA
PtInRect
ReleaseCapture
GetSystemMetrics
DestroyIcon
SetDlgItemTextA
SetDlgItemTextW
SetWindowTextA
PostMessageA
GetWindowRect
GetWindowPlacement
EndDialog
SetWindowPlacement
GetDC
SendMessageA
DrawTextA
MessageBoxA
wsprintfW
GetSysColor
gdi32
GetObjectA
CreateFontIndirectA
SelectObject
comdlg32
GetSaveFileNameW
advapi32
SetNamedSecurityInfoW
RegSetValueExW
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
FreeSid
SetEntriesInAclA
AllocateAndInitializeSid
RegSetValueExA
shell32
CommandLineToArgvW
ShellExecuteA
ExtractIconExW
SHFileOperationW
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE