Behavioral task
behavioral1
Sample
cb679852c93126cb08456bc17ddf6b1c5b607d506b1f895b9d128b67d341a7e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb679852c93126cb08456bc17ddf6b1c5b607d506b1f895b9d128b67d341a7e1.exe
Resource
win10v2004-20220812-en
General
-
Target
cb679852c93126cb08456bc17ddf6b1c5b607d506b1f895b9d128b67d341a7e1
-
Size
152KB
-
MD5
4364a0b1c2002a18e4327979afb0fafe
-
SHA1
1cc812d2dbdc33a6b93b0ed0cf2891b391d74d68
-
SHA256
cb679852c93126cb08456bc17ddf6b1c5b607d506b1f895b9d128b67d341a7e1
-
SHA512
664988339b70e0eaab3f57bf41829df95d65b4d80a70f31d0d620a56ad31c742117a07c7cbbd281cf53e59a0a74f221720fc41ddcb405ed8b559f917b14603e4
-
SSDEEP
3072:D0ESlBFb/HIAmIVvGOrb+5yn9+d60+VeK5p3I0qiiiCQm:DvVAmIVvG6K5y9+z+VeDQm
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cb679852c93126cb08456bc17ddf6b1c5b607d506b1f895b9d128b67d341a7e1.exe windows x86
4cedef9b7414d7d3d03c3c4ddd6ef4e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
OpenEventA
SetEvent
GetVersionExA
GetStringTypeW
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetLastError
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
CloseHandle
user32
MessageBoxA
advapi32
RegOpenKeyExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegEnumKeyA
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE