Behavioral task
behavioral1
Sample
e021347b454ed2d9cdd366f8de411dab22c153f9c001e6c78ace7070f5840f63.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e021347b454ed2d9cdd366f8de411dab22c153f9c001e6c78ace7070f5840f63.exe
Resource
win10v2004-20220812-en
General
-
Target
e021347b454ed2d9cdd366f8de411dab22c153f9c001e6c78ace7070f5840f63
-
Size
140KB
-
MD5
63d2f5f9f1a14cff12004707e44f2520
-
SHA1
26006956a8d36f6a89523324f36e2bfa923a7063
-
SHA256
e021347b454ed2d9cdd366f8de411dab22c153f9c001e6c78ace7070f5840f63
-
SHA512
5feba771581b4b52e26e7bce80a7ac655a3ac74c78bf8dc716c815fcf73d2d12a781d7f464d9a48517cb8647c625c8528b5e66edbb6500ad2e9b2b4002febc62
-
SSDEEP
3072:gsMwuEoqBpmO0f7r9a7tmuqSDmTi6TNh80gS0UD6Wpc9tpYZDvz0:gsMJ6BpmOe7RmUuvDkTpr0UD6W6lq0
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e021347b454ed2d9cdd366f8de411dab22c153f9c001e6c78ace7070f5840f63.exe windows x86
bcd6713d96df4f3718e8d8980dd69bc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
GetLastError
GetCurrentDirectoryA
FreeEnvironmentStringsA
GetFileType
HeapDestroy
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapAlloc
GetCPInfo
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
LCMapStringA
LCMapStringW
SetFilePointer
HeapReAlloc
GetACP
GetOEMCP
VirtualAlloc
SetStdHandle
GetProcAddress
LoadLibraryA
FlushFileBuffers
user32
MessageBoxA
advapi32
ControlService
StartServiceA
OpenSCManagerA
CloseServiceHandle
DeleteService
OpenServiceA
CreateServiceA
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE