Behavioral task
behavioral1
Sample
63a9ae122b309c0163eef07a67e8a17d0b0e828c5463e8966bb5adb78f9f4c2f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63a9ae122b309c0163eef07a67e8a17d0b0e828c5463e8966bb5adb78f9f4c2f.exe
Resource
win10v2004-20220812-en
General
-
Target
63a9ae122b309c0163eef07a67e8a17d0b0e828c5463e8966bb5adb78f9f4c2f
-
Size
424KB
-
MD5
6b64d290901c8017faf8836f7fd71a52
-
SHA1
0580aba152b249b8362a593eac4332b94d99d966
-
SHA256
63a9ae122b309c0163eef07a67e8a17d0b0e828c5463e8966bb5adb78f9f4c2f
-
SHA512
842f5593cd3a9ad44f52b18d526971ea92784cddb40d30d99bb96c505cb08e7d561cb5faf86f1e4e7223d50e3968c9dfdf4a3f97fbe6ff292fc37866ccfbe484
-
SSDEEP
6144:jD1o0OL8AdgM8ege9Lk2XLV6/obdECcgrSKRHGu:jD1o+Ur+27g/obdECXrS8HGu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
63a9ae122b309c0163eef07a67e8a17d0b0e828c5463e8966bb5adb78f9f4c2f.exe windows x86
bc679710465af6c8e337e2bd33115ca7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
iswspace
iswdigit
vswprintf
wcsstr
_wcslwr
wcschr
memcpy
memmove
_wcsdup
calloc
_wcsicmp
wcsncmp
_except_handler3
wcstok
wcsrchr
malloc
swprintf
_wtoi
memcmp
free
wcscpy
wcsncpy
swscanf
strlen
_waccess
wcscmp
wcslen
strcmp
__CxxFrameHandler
_vsnwprintf
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
_controlfp
kernel32
GetModuleHandleA
IsBadReadPtr
IsBadWritePtr
IsBadStringPtrW
GetModuleHandleW
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
GetProcAddress
GetFileInformationByHandle
SetLastError
GetVersionExW
GlobalAlloc
GlobalLock
GetModuleFileNameW
GetPrivateProfileIntW
GlobalDeleteAtom
FreeLibrary
LoadLibraryW
GlobalAddAtomW
GlobalFindAtomW
WideCharToMultiByte
lstrlenW
GetTempPathW
Sleep
DeleteFileW
GetUserDefaultLangID
SetPriorityClass
GetCurrentProcess
lstrcpyW
CompareStringW
CloseHandle
CreateFileW
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
ReadFile
GetFileSize
GetFileAttributesW
GlobalFree
CreateDirectoryW
FindClose
FindNextFileW
FindFirstFileW
GetPrivateProfileStringW
GetPrivateProfileStringA
WritePrivateProfileStringW
GetStartupInfoA
user32
ReleaseDC
SetWindowTextW
GetDC
DrawTextW
GetSysColor
EndPaint
BeginPaint
GetSystemMetrics
PeekMessageW
DispatchMessageW
MoveWindow
GetClientRect
SetPropW
GetWindowLongW
InvalidateRect
ClientToScreen
GetPropW
CreateWindowExW
EndDialog
SetDlgItemTextW
PtInRect
CallWindowProcW
ScreenToClient
EnableWindow
GetDlgItem
SendMessageW
SetWindowLongW
GetParent
PostMessageW
KillTimer
GetWindowRect
SystemParametersInfoW
SetWindowPos
SendDlgItemMessageW
ShowWindow
SetTimer
FindWindowW
SetFocus
LoadIconW
DialogBoxIndirectParamW
RemovePropW
LoadStringW
RegisterWindowMessageW
IsWindow
OffsetRect
wsprintfW
CopyRect
gdi32
DeleteDC
GetStockObject
CreateCompatibleBitmap
CreateCompatibleDC
SetBkMode
SetBkColor
ExtTextOutW
GetTextMetricsW
GetTextExtentPoint32W
SelectObject
SetTextColor
CreateFontW
CreateSolidBrush
BitBlt
DeleteObject
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyW
RegSetValueExA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
shell32
SHChangeNotify
ShellExecuteW
ole32
CoGetObject
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromString
OleSetContainedObject
OleCreate
oleaut32
SysAllocStringLen
SysFreeString
SysStringLen
VariantClear
SysAllocString
comctl32
PropertySheetW
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE