Behavioral task
behavioral1
Sample
df1615ddfcbe9a4e6827b4c5f269c66650ccc204e57f8d3cfc687e452031c455.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
df1615ddfcbe9a4e6827b4c5f269c66650ccc204e57f8d3cfc687e452031c455.exe
Resource
win10v2004-20220901-en
General
-
Target
df1615ddfcbe9a4e6827b4c5f269c66650ccc204e57f8d3cfc687e452031c455
-
Size
117KB
-
MD5
63dc05a32fd5c6da5bbc5ff990020595
-
SHA1
09f1081ea60d29007977444d049990f5a75962b8
-
SHA256
df1615ddfcbe9a4e6827b4c5f269c66650ccc204e57f8d3cfc687e452031c455
-
SHA512
e930e45e575e192d1c94ed4978ae7e0126a19c1a7955c9c4fd98672f51f1cb44fa1f3dad271779f76164766a3b9f2814173c038dc91562ffd1a3a0f7ef732062
-
SSDEEP
3072:GKHjiuSWiHxNtOwJQIvllMgx0PJEw0Zck+xIy0FgCnf8Xf:GKnSWiHxDOwJQIvlKZPJSZhKIyic
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
df1615ddfcbe9a4e6827b4c5f269c66650ccc204e57f8d3cfc687e452031c455.exe windows x86
9420ebcb3df4a10fe54b20a468e139c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
kernel32
CloseHandle
GetLastError
CreateEventW
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
_cexit
??1type_info@@UAE@XZ
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_except_handler4_common
_controlfp
memset
__set_app_type
__CxxFrameHandler3
swprintf_s
??0exception@@QAE@XZ
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
__getmainargs
malloc
_callnewh
_CxxThrowException
free
??0exception@@QAE@ABV0@@Z
ole32
CoSetProxyBlanket
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CLSIDFromString
CoInitialize
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 722B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE