Behavioral task
behavioral1
Sample
f1a4b756f93d117faba36a16fa0626af0f09d0b831bb6f5d4ba2fea98f85a112.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1a4b756f93d117faba36a16fa0626af0f09d0b831bb6f5d4ba2fea98f85a112.exe
Resource
win10v2004-20220901-en
General
-
Target
f1a4b756f93d117faba36a16fa0626af0f09d0b831bb6f5d4ba2fea98f85a112
-
Size
43KB
-
MD5
67d8900e896c8a73e1598db4b66ceddc
-
SHA1
3807b855348d2ed9527c628fd9fa813a38f28a3b
-
SHA256
f1a4b756f93d117faba36a16fa0626af0f09d0b831bb6f5d4ba2fea98f85a112
-
SHA512
8fb56ebacecd12974ce5e7416ef15b30c650f98ce547a43af3f7c9319cef9e93f266e6a5b584079f22181bb6c4ed3fe4236924420aae9e39eaf9a17ad5963666
-
SSDEEP
384:Ycq9cnGBUASVsQw/0V73ldcw/owYQRkxdyJkgvFjBspct50Mg7Ktol:Yth18sQw/0V73dowYPxYFFjGat50sol
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f1a4b756f93d117faba36a16fa0626af0f09d0b831bb6f5d4ba2fea98f85a112.exe windows x86
106b6602da05f82f70013536a3fae794
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
GetStartupInfoA
OpenProcess
CreateFileMappingA
Sleep
CreateThread
GetLastError
MapViewOfFile
CopyFileA
WinExec
GetModuleFileNameA
CreateProcessA
GetSystemDirectoryA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateFileA
WriteFile
CloseHandle
FreeResource
TerminateProcess
lstrlenA
GetProcAddress
GetModuleHandleA
lstrcpyA
lstrcatA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memset
strstr
user32
FindWindowA
GetWindowThreadProcessId
Sections
UPX0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE