Behavioral task
behavioral1
Sample
558c7482bec4e58fc026e7c85e6d90524cf60ed3a4bc69b9d93433bd1cf703b9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
558c7482bec4e58fc026e7c85e6d90524cf60ed3a4bc69b9d93433bd1cf703b9.exe
Resource
win10v2004-20220901-en
General
-
Target
558c7482bec4e58fc026e7c85e6d90524cf60ed3a4bc69b9d93433bd1cf703b9
-
Size
792KB
-
MD5
703c278c2510ec96efce26874a962886
-
SHA1
2b44b24ffc783880072c692751ecd9ac63394b88
-
SHA256
558c7482bec4e58fc026e7c85e6d90524cf60ed3a4bc69b9d93433bd1cf703b9
-
SHA512
9585d8bbb65645e3102dda95f4db62a1e644aced7562c2703ea79217e5b726af7c299a2e02c1205aa737b505bf2a78b063e0d3c51a4e0d9a7bea3d4b74d83e65
-
SSDEEP
6144:jvgbUvUIdOJ1gZLiUfGOKYdYt0dinQ1fSjcuf+ZmrQ9mAeR+MFtzge85LUeFO/Yl:jvgbUvifOxmnQlHmrQ99eR+0uewUOy8
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
558c7482bec4e58fc026e7c85e6d90524cf60ed3a4bc69b9d93433bd1cf703b9.exe windows x86
3438aa1d4cd2de060b919386c0aaa38c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
mixerClose
mixerGetControlDetailsW
mixerSetControlDetails
mixerGetLineInfoW
mixerOpen
mixerGetLineControlsW
mixerGetNumDevs
kernel32
AllocConsole
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExW
lstrlenW
RaiseException
GetLastError
CloseHandle
CreateEventW
SetEvent
GetModuleFileNameW
FreeConsole
WaitForSingleObject
FindClose
FindNextFileW
FindFirstFileW
SetConsoleTitleW
FreeResource
GetModuleHandleW
GlobalUnlock
GlobalFree
GlobalLock
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceW
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
InterlockedCompareExchange
WriteFile
GetCommandLineW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
ExitProcess
GetVersionExA
IsBadReadPtr
GetEnvironmentVariableW
GetProcAddress
FreeLibrary
LoadLibraryW
GetSystemDefaultLangID
GetLocaleInfoW
user32
RegisterClassW
IsWindow
IsWindowVisible
LoadImageW
SendMessageW
LoadIconW
SetWindowTextW
CreateWindowExW
DestroyWindow
DefWindowProcW
GetMessageW
TranslateMessage
DispatchMessageW
PostQuitMessage
SetForegroundWindow
KillTimer
SetTimer
UnregisterClassW
RegisterWindowMessageW
GetWindowLongW
SetWindowLongW
GetKeyState
MessageBoxW
PostMessageW
shell32
ShellExecuteExW
ole32
OleLoadFromStream
CreateStreamOnHGlobal
CoInitializeEx
CoUninitialize
CoCreateInstance
CoDisconnectObject
oleaut32
VariantInit
VariantChangeTypeEx
RegisterActiveObject
GetActiveObject
SysAllocString
SysFreeString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
VarBstrCat
SysAllocStringLen
VariantChangeType
VariantClear
VarBstrCmp
VariantCopy
RevokeActiveObject
shlwapi
SHRegCloseUSKey
SHRegCreateUSKeyW
SHRegGetUSValueW
PathRemoveFileSpecW
msvcp71
?_Nomemory@std@@YAXXZ
?begin@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE?AViterator@12@XZ
?end@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE?AViterator@12@XZ
??$?9GU?$char_traits@G@std@@V?$allocator@G@1@@std@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@0@Z
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??$?MGU?$char_traits@G@std@@V?$allocator@G@1@@std@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@0@Z
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?find@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIPBGI@Z
?replace@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@IIABV12@@Z
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
?append@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@IG@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBG@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@G@Z
msvcr71
_wcsdup
_iob
??1exception@@UAE@XZ
??0exception@@QAE@XZ
memmove
_purecall
??_V@YAXPAX@Z
wcslen
_wsplitpath
strlen
memcpy
wcscmp
wcsncpy
_stricmp
_wtoi
memset
strcmp
strncpy
_snwprintf
_vsnwprintf
_vscwprintf
_callnewh
??1type_info@@UAE@XZ
__security_error_handler
__dllonexit
_onexit
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strupr
_CxxThrowException
_except_handler3
??0exception@@QAE@ABV0@@Z
__CxxFrameHandler
??3@YAXPAX@Z
free
malloc
puts
freopen
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 536KB - Virtual size: 532KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE