Behavioral task
behavioral1
Sample
32b12173bbcf49d4fa25d9c0d43024b2faee00de628ddb1b8ddc174badf14340.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
32b12173bbcf49d4fa25d9c0d43024b2faee00de628ddb1b8ddc174badf14340.exe
Resource
win10v2004-20220812-en
General
-
Target
32b12173bbcf49d4fa25d9c0d43024b2faee00de628ddb1b8ddc174badf14340
-
Size
196KB
-
MD5
6e3d2ef1e336b9ae9e56967b2223eee0
-
SHA1
57ad0f6e4224f25ad235484ed0661411036d019b
-
SHA256
32b12173bbcf49d4fa25d9c0d43024b2faee00de628ddb1b8ddc174badf14340
-
SHA512
b40f0396aacb8af4fa6aa3dd14fb7fe65b1b715e3e98102b7a7dce20dc60abea8de02edaa821195f8c8922ca40cd8c04bec8d3fd52eb00c0a205f8888db8c9bc
-
SSDEEP
3072:rzxoUohTxlGZby89coqofk2zMrsBsoBu5insNWRhuYngwUY:r1oXhTSxcQzMIBszsnsNwPR
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
32b12173bbcf49d4fa25d9c0d43024b2faee00de628ddb1b8ddc174badf14340.exe windows x86
51612e1382618c352ce2b2fe615c4f5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
RaiseException
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapSize
HeapReAlloc
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
LoadLibraryA
FreeLibrary
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
GetProfileStringA
SetEndOfFile
FlushFileBuffers
ReadFile
SetFilePointer
WriteFile
CreateFileA
GetCurrentProcess
GetCPInfo
SetErrorMode
GetOEMCP
GetLastError
SizeofResource
GetProcessVersion
WritePrivateProfileStringA
lstrcpynA
GlobalFlags
TlsSetValue
TlsGetValue
LocalReAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
VirtualFree
DeleteCriticalSection
TlsFree
CloseHandle
GlobalHandle
LocalFree
TlsAlloc
GetModuleFileNameA
InitializeCriticalSection
LocalAlloc
GetProcAddress
MulDiv
SetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedIncrement
InterlockedDecrement
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
VirtualAlloc
IsBadWritePtr
user32
CopyRect
ScreenToClient
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
CheckRadioButton
IsDialogMessageA
SetWindowTextA
LoadStringA
DestroyMenu
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
InvalidateRect
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetWindow
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
PostMessageA
FindWindowA
ShowWindow
LoadIconA
GetClassInfoA
RegisterClassA
SetForegroundWindow
GetForegroundWindow
RegisterWindowMessageA
RemovePropA
ShowCaret
IsWindowUnicode
CharNextA
InflateRect
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
HideCaret
UnregisterClassA
gdi32
GetClipBox
CreateBitmap
SetTextColor
SetBkColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
CreateSolidBrush
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
CreateCompatibleDC
BitBlt
CreateDIBitmap
GetTextExtentPointA
PatBlt
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
comctl32
ord17
Sections
.text Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE