Behavioral task
behavioral1
Sample
d65178715957698fdaf6c91840e30a1c7ab79d029322e0855d6d80f235469bf9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d65178715957698fdaf6c91840e30a1c7ab79d029322e0855d6d80f235469bf9.exe
Resource
win10v2004-20220812-en
General
-
Target
d65178715957698fdaf6c91840e30a1c7ab79d029322e0855d6d80f235469bf9
-
Size
300KB
-
MD5
6c274cb6f027b3726fbd9cfec53840e0
-
SHA1
af933d88f176bbb5781c4b567379718f8994f6ed
-
SHA256
d65178715957698fdaf6c91840e30a1c7ab79d029322e0855d6d80f235469bf9
-
SHA512
01fae95302a709f07d3fac4e368ecd4f0b7e2de3165dcee7d9bc6a1e63b420c79a3944839867bdb392a7799d1986f2f72d82dcfd1b9f2b88afd773cb8aab36e0
-
SSDEEP
6144:gDLzNPA+clRDvO4SIA1AT+UBiPVCi55bdbP9GwCUKMCux:gDFPkbDvJAmTs9C+hGaCk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d65178715957698fdaf6c91840e30a1c7ab79d029322e0855d6d80f235469bf9.exe windows x86
25c8c6e6c30120369c68264f14b45dae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
LoadLibraryA
FreeLibrary
GetSystemDirectoryA
lstrcpynA
GetVersionExA
GetPrivateProfileStringA
GetProcAddress
GetEnvironmentStrings
LCMapStringW
LCMapStringA
GetLocaleInfoW
GetOEMCP
GetACP
HeapReAlloc
VirtualAlloc
GetLastError
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
HeapAlloc
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
GetWindowsDirectoryA
TerminateProcess
lstrcpyA
GetModuleHandleA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
lstrcmpiA
GetSystemDefaultLCID
lstrlenA
GetLocaleInfoA
GetCommandLineA
IsValidLocale
GetStartupInfoA
GetCPInfo
GetVersion
ExitProcess
HeapFree
user32
DispatchMessageA
wsprintfA
DefWindowProcA
PostQuitMessage
DestroyWindow
MessageBoxA
GetMessageA
TranslateMessage
CreateWindowExA
UpdateWindow
FindWindowA
SetForegroundWindow
LoadCursorA
RegisterClassA
LoadIconA
DestroyIcon
gdi32
CreateDCA
DeleteDC
ExtEscape
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
FindExecutableA
Shell_NotifyIconA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE