Behavioral task
behavioral1
Sample
5c801c9218f273e9ba0a9dfeeca6bd6c5c07219ce951bab1d647e052768ff912.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c801c9218f273e9ba0a9dfeeca6bd6c5c07219ce951bab1d647e052768ff912.exe
Resource
win10v2004-20220812-en
General
-
Target
5c801c9218f273e9ba0a9dfeeca6bd6c5c07219ce951bab1d647e052768ff912
-
Size
249KB
-
MD5
6e4efa862bfa82f02fb33231f9e19d97
-
SHA1
8e9b110d55d3985307b03152212cbc4a453e842f
-
SHA256
5c801c9218f273e9ba0a9dfeeca6bd6c5c07219ce951bab1d647e052768ff912
-
SHA512
d1aa0110468d4a30da7aaca258aa87ef72944cbe98751ca12668f2c1f8b973239147dd46c210127958c22badf67d05cfb66674f595f09b4fac831f04601e4fea
-
SSDEEP
6144:VTnjNh5zcO/U2yRDsr+kuILdwmOCFshF/HxFZuk:55zT81NSZwm9FsX/HxKk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5c801c9218f273e9ba0a9dfeeca6bd6c5c07219ce951bab1d647e052768ff912.exe windows x86
8ce188e416670c450b6620c925728d8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetVersionExA
OpenEventW
WaitForSingleObject
GetModuleHandleW
CreateDirectoryW
MoveFileW
LocalFree
LocalAlloc
DeleteFileW
EnumUILanguagesW
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
FreeLibrary
ExpandEnvironmentStringsW
CreateFileW
CloseHandle
lstrcmpW
WriteFile
LoadLibraryExW
lstrlenW
LoadLibraryW
GetProcAddress
UnhandledExceptionFilter
msvcrt
_exit
_cexit
__getmainargs
_XcptFilter
free
exit
_initterm
_amsg_exit
wcschr
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_vsnwprintf
memset
?terminate@@YAXXZ
_controlfp
shlwapi
PathFileExistsW
StrStrW
PathFindFileNameW
ord158
StrCmpNW
ord215
advapi32
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
user32
LoadStringW
GetSystemMetrics
shell32
SHSetLocalizedName
SHGetFolderPathAndSubDirW
iertutil
ord675
ord672
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE