Behavioral task
behavioral1
Sample
5fb0dbd3a375c53d4b6b04beb868a25871f2bd035b2015b30b8d52ad1c7b8b0b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5fb0dbd3a375c53d4b6b04beb868a25871f2bd035b2015b30b8d52ad1c7b8b0b.exe
Resource
win10v2004-20220812-en
General
-
Target
5fb0dbd3a375c53d4b6b04beb868a25871f2bd035b2015b30b8d52ad1c7b8b0b
-
Size
304KB
-
MD5
6f4d608a9694e5589341d7c35cec2620
-
SHA1
43841cf7ab414fefd1d2d2fb858e2164ebc3ae8c
-
SHA256
5fb0dbd3a375c53d4b6b04beb868a25871f2bd035b2015b30b8d52ad1c7b8b0b
-
SHA512
46c7ae57672932aa3e22f02a3e608933b0c81d2c9c0877b06432b033c635cafb7edca88aa4e2cfff5e752479e9b6f8336139e0b9019a1d9d3ff7fe4806b6e2a0
-
SSDEEP
6144:hHczrqWOjhjHclRDvO4SIA1AT+UBiPVCi55bdbP9GwCUKMCux:GzrqL8bDvJAmTs9C+hGaCk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5fb0dbd3a375c53d4b6b04beb868a25871f2bd035b2015b30b8d52ad1c7b8b0b.exe windows x86
1fe332c3e902ad97027f3cb4769c641d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
ExpandEnvironmentStringsW
GetCurrentProcess
GetVersionExW
GetProcAddress
LoadLibraryW
FreeLibrary
GetFileAttributesW
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
CreateFileW
FindFirstFileW
FindClose
GetModuleFileNameW
GetCurrentDirectoryW
GetFullPathNameW
lstrlenW
ReadFile
SetFilePointer
InterlockedExchange
Sleep
GetComputerNameW
LoadLibraryA
GetFileSizeEx
GetACP
InterlockedCompareExchange
GetStartupInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CloseHandle
user32
LoadIconW
GetDesktopWindow
advapi32
GetUserNameW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ole32
OleInitialize
CoTaskMemFree
OleUninitialize
msvcr80
_wcsicmp
wcsncpy
_controlfp_s
memset
wcsrchr
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_decode_pointer
_onexit
memcpy
_lock
__dllonexit
_unlock
__set_app_type
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
?what@exception@std@@UBEPBDXZ
strlen
??0exception@std@@QAE@XZ
memcpy_s
??2@YAPAXI@Z
memmove_s
??_V@YAXPAX@Z
_invalid_parameter_noinfo
wcsstr
wcschr
_CxxThrowException
__CxxFrameHandler3
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE