Behavioral task
behavioral1
Sample
10ac293ad1f006794293f62a24bf10e6798125236a87e909eb402346ce18182a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
10ac293ad1f006794293f62a24bf10e6798125236a87e909eb402346ce18182a.exe
Resource
win10v2004-20220812-en
General
-
Target
10ac293ad1f006794293f62a24bf10e6798125236a87e909eb402346ce18182a
-
Size
135KB
-
MD5
5594a3c028eecc0201f71e56821d6179
-
SHA1
92333af330872da97bd1546a301518a86311e2c4
-
SHA256
10ac293ad1f006794293f62a24bf10e6798125236a87e909eb402346ce18182a
-
SHA512
193a72f935140a3e65c0f5b48db3a148c6ff6c2da15c82e61dcc4f339b3d7ceeb5c2b1236d077053e58c044ce0bfeb9b7aef710459f1acec2d32625de4231b48
-
SSDEEP
3072:toc1vLLRBJIy550kLCQxlCLAJCRuHicQi:rJ70kZCLqkZcp
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
10ac293ad1f006794293f62a24bf10e6798125236a87e909eb402346ce18182a.exe windows x86
533e942dcccabc99f9aad045ca757e52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowA
SendMessageA
PostMessageA
kernel32
GetVersionExA
LCMapStringW
LCMapStringA
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
Sections
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE