Behavioral task
behavioral1
Sample
003325b67d0df9a221c57d1c9ab8fdb4f1690322f25189e28de46c4c007cf6d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
003325b67d0df9a221c57d1c9ab8fdb4f1690322f25189e28de46c4c007cf6d9.exe
Resource
win10v2004-20220812-en
General
-
Target
003325b67d0df9a221c57d1c9ab8fdb4f1690322f25189e28de46c4c007cf6d9
-
Size
161KB
-
MD5
6dfe1f9c1e952ede291bb62c77c2b30d
-
SHA1
a2ecd84678c57a83e43d332d3e46e81de6966918
-
SHA256
003325b67d0df9a221c57d1c9ab8fdb4f1690322f25189e28de46c4c007cf6d9
-
SHA512
340b559ee869391986853eab393b636add015d2960b4bf596cff3bf134ffb47b6a753cacd8be1e3fa4bfb434191a2949498d707e53026bf9384def65925b81a7
-
SSDEEP
3072:6kJHy/fEOaMP23e1EdXlMkLfVyg9J2fWWSgG57k:6kQ/fEOge1EdX6k5/9Jnk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
003325b67d0df9a221c57d1c9ab8fdb4f1690322f25189e28de46c4c007cf6d9.exe windows x86
4277574cc7974b7810d952b4499c3d53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
lstrcpyA
FindClose
ReadFile
GlobalAlloc
CreateFileA
SetFilePointer
CloseHandle
MultiByteToWideChar
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
TlsAlloc
TlsFree
TlsGetValue
GetLastError
TlsSetValue
ExitProcess
GlobalFree
IsBadReadPtr
RtlUnwind
GetCurrentProcess
DuplicateHandle
GetStdHandle
InitializeCriticalSection
DeleteCriticalSection
FindNextFileA
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteFile
DeleteFileA
msvcrt
_mbsrchr
_mbschr
oleaut32
SysAllocString
SysAllocStringByteLen
user32
wsprintfA
MessageBoxA
ole32
OleInitialize
CoCreateInstance
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.exc Size: 512B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE