Behavioral task
behavioral1
Sample
7f7c5c12837380d0a4c72038e68551384c3f2a43ffa0f3539745589f96915bf9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7f7c5c12837380d0a4c72038e68551384c3f2a43ffa0f3539745589f96915bf9.exe
Resource
win10v2004-20220812-en
General
-
Target
7f7c5c12837380d0a4c72038e68551384c3f2a43ffa0f3539745589f96915bf9
-
Size
114KB
-
MD5
679c38a5a9e88ee8567fa6dce3613160
-
SHA1
b9d51bb9d0c9e913214e0e0c55f73fbcd801bd00
-
SHA256
7f7c5c12837380d0a4c72038e68551384c3f2a43ffa0f3539745589f96915bf9
-
SHA512
408a0b62bb85dfe284d0bb26679ba31550aaebb60024c5a39b8775be57d111253ce8fa48c537e9de3fa0d117e1f4a3bbb21b39ec24724960a3a825a993fc27ff
-
SSDEEP
3072:Ieko2qoW4P7wmm8DhbkmJud+jbKWeeqM/Rt:Ieko2qoWe7w1yhbLJxeeqM/P
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7f7c5c12837380d0a4c72038e68551384c3f2a43ffa0f3539745589f96915bf9.exe windows x86
a64ee764367f47bfe75a9e2aa9bf9559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetModuleHandleA
GetStartupInfoW
msvcrt
??2@YAPAXI@Z
_c_exit
_exit
_XcptFilter
_cexit
exit
_wcmdln
__wgetmainargs
wcstok
wcslen
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__setusermatherr
wcscpy
??3@YAXPAX@Z
_initterm
msdtctm
ord4
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE