Behavioral task
behavioral1
Sample
6b83eb06baca7ce34f7d6f016fe6d4f16ae67c32dff0dc7287bd0a174b6ba8c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b83eb06baca7ce34f7d6f016fe6d4f16ae67c32dff0dc7287bd0a174b6ba8c9.exe
Resource
win10v2004-20220812-en
General
-
Target
6b83eb06baca7ce34f7d6f016fe6d4f16ae67c32dff0dc7287bd0a174b6ba8c9
-
Size
332KB
-
MD5
4fea0a94be6cb0bd76b0a1f4ac7af45d
-
SHA1
8831d7673a4482e5a389f49c891cfedabdad5793
-
SHA256
6b83eb06baca7ce34f7d6f016fe6d4f16ae67c32dff0dc7287bd0a174b6ba8c9
-
SHA512
0f1c28e81eeb545c2b5533958cb47b4ab51442cc04cdce8a0802392e20959a17e154b29a6283b94cbdb5a2214777127983c82e4f73156137c4dd61d25d527b7e
-
SSDEEP
6144:sMi744gj/WMG/GnoB0BwPWY8VYDzioSwQjdmEa0zfMnel:sMi744gjdG/Gn40zYnieWdJa0zfj
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6b83eb06baca7ce34f7d6f016fe6d4f16ae67c32dff0dc7287bd0a174b6ba8c9.exe windows x86
d889a2b60434111e8c7ee521144cd9b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GlobalUnlock
GlobalLock
OpenMutexA
GetLocaleInfoA
LockResource
SizeofResource
LoadResource
FindResourceA
CreateDirectoryA
SetCurrentDirectoryA
GetWindowsDirectoryA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
GetLastError
GlobalAlloc
lstrlenA
GetLocalTime
RemoveDirectoryA
DeleteFileA
GetCurrentDirectoryA
GetSystemDirectoryA
CreateMutexA
lstrcatA
lstrcpyA
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
Module32Next
Module32First
GetVolumeInformationA
GetDriveTypeA
HeapFree
HeapAlloc
GetProcessHeap
SetEndOfFile
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
IsBadCodePtr
CreateToolhelp32Snapshot
SetUnhandledExceptionFilter
CreateFileA
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
VirtualQuery
InterlockedExchange
LoadLibraryA
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
HeapSize
HeapReAlloc
GetCurrentProcess
GetProcAddress
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
ReadFile
WriteFile
GetModuleFileNameA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetVersionExA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
Process32First
WinExec
OpenProcess
TerminateProcess
Process32Next
CloseHandle
MultiByteToWideChar
GetEnvironmentVariableA
SetFileAttributesA
CopyFileA
GetSystemTime
IsBadReadPtr
user32
CharLowerA
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
CreateWindowExA
SetActiveWindow
SetForegroundWindow
GetWindow
GetForegroundWindow
MoveWindow
GetSystemMetrics
GetWindowRect
SendMessageA
DestroyWindow
FindWindowA
SetWindowTextA
GetWindowTextA
GetDesktopWindow
keybd_event
ShowWindow
OpenIcon
CloseWindow
IsIconic
SetClipboardData
EmptyClipboard
MessageBoxA
DispatchMessageA
GetMessageA
SetTimer
UpdateWindow
RegisterClassA
LoadCursorA
LoadIconA
DefWindowProcA
PostQuitMessage
CreatePopupMenu
AppendMenuA
SetMenuDefaultItem
PtInRect
GetClassNameA
GetWindowThreadProcessId
EnumWindows
RegisterHotKey
KillTimer
IsWindowVisible
ExitWindowsEx
SetCursor
GetCursorPos
TrackPopupMenu
CheckMenuItem
gdi32
CreateSolidBrush
advapi32
RegDeleteKeyA
OpenProcessToken
GetTokenInformation
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
shell32
Shell_NotifyIconA
ShellExecuteA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
gdiplus
GdipDisposeImage
GdipCreateBitmapFromScan0
GdipGetImagePixelFormat
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawImageRectI
GdipDrawImageI
GdipDrawImage
GdipDrawString
GdipDrawEllipseI
GdipDrawLineI
GdipCloneImage
GdipGetImageGraphicsContext
GdipCreateFromHWNDICM
GdipCreateFromHWND
GdipSetStringFormatAlign
GdipCreateStringFormat
GdipDeletePen
GdipCreatePen1
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipAlloc
GdipFree
GdiplusStartup
GdipCreateBitmapFromResource
GdipCloneBitmapAreaI
GdipDeleteStringFormat
GdipDeleteGraphics
Sections
.text Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE