Behavioral task
behavioral1
Sample
2e98f4953c69e540fec00079646c51283cab49070e383d662ec663404ec03e42.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e98f4953c69e540fec00079646c51283cab49070e383d662ec663404ec03e42.exe
Resource
win10v2004-20220812-en
General
-
Target
2e98f4953c69e540fec00079646c51283cab49070e383d662ec663404ec03e42
-
Size
160KB
-
MD5
56ed60d479e6606b05329b07962633ae
-
SHA1
cacf5c22eb36b5ea60bf56c153467e53c67cd343
-
SHA256
2e98f4953c69e540fec00079646c51283cab49070e383d662ec663404ec03e42
-
SHA512
2e6ebd14a6ab60b686b17de89edd4932e79e7b201a5fb422387357f8464619dffaef7559c27f42c39e82f4decc864408bab7e420a8d7df16004423007c6f359a
-
SSDEEP
3072:R9lTl6T8TtBUbGUuUcOYUhy42ppFHtBtIH1DI13SsY1c6TNQOHh5JjfcoC2iYleQ:R9Rxx/UR2NxIHA3SsY1cHsLZC0eCTUUd
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
2e98f4953c69e540fec00079646c51283cab49070e383d662ec663404ec03e42.exe windows x86
1cf0d8aa0a3e498b44c3f8fb27b99bfb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetAce
GetSecurityInfo
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegNotifyChangeKeyValue
SetSecurityInfo
kernel32
lstrlenW
ExpandEnvironmentStringsW
LocalAlloc
SetEvent
LocalReAlloc
FindClose
FindNextFileW
CompareStringW
lstrcmpiW
GetLastError
FindFirstFileW
LeaveCriticalSection
EnterCriticalSection
ExitThread
GetEnvironmentVariableW
FindCloseChangeNotification
CloseHandle
Sleep
WaitForMultipleObjects
FindNextChangeNotification
CreateEventW
FindFirstChangeNotificationW
ResumeThread
SetThreadPriority
CreateThread
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
SetProcessShutdownParameters
OpenEventW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
GetCurrentProcess
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
ExitProcess
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
GetLocaleInfoA
VirtualProtect
GetSystemInfo
FlushFileBuffers
LocalFree
SetUnhandledExceptionFilter
user32
LoadStringW
SetForegroundWindow
CheckDlgButton
SendMessageW
GetClientRect
GetDlgItem
EndDialog
PostMessageW
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextW
DestroyIcon
GetWindowRect
SetTimer
LoadImageW
DialogBoxParamW
MessageBoxW
DefWindowProcW
LoadIconW
PostQuitMessage
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
RegisterClassW
GetWindowLongW
GetSystemMetrics
KillTimer
GetParent
GetDesktopWindow
SetWindowPos
shell32
ord60
Shell_NotifyIconW
SHGetFileInfoW
comctl32
ord17
ole32
CoInitialize
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE