Behavioral task
behavioral1
Sample
3c637fff56212009bf48eda208ef5888f8bac37dc9d9e7b79b3b1ca0697bd5b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c637fff56212009bf48eda208ef5888f8bac37dc9d9e7b79b3b1ca0697bd5b5.exe
Resource
win10v2004-20220812-en
General
-
Target
3c637fff56212009bf48eda208ef5888f8bac37dc9d9e7b79b3b1ca0697bd5b5
-
Size
268KB
-
MD5
639a04969168929b87fb077874578191
-
SHA1
708ebda6fa0f5761a5140ff5165551bf801e4734
-
SHA256
3c637fff56212009bf48eda208ef5888f8bac37dc9d9e7b79b3b1ca0697bd5b5
-
SHA512
1b8de02f77e1e0f97ee34973ac3f1b9b43422a7776c5bc7de5751dfb23cfbe9c1a2992f27b0fe888ae742eceec28276490335ea5c19501e1f8f16c70defaba5e
-
SSDEEP
6144:Nyx3vvFgXWGF8Fj7HyuYf3dLoOH0YcjykNWEMVsyK/:N83qF8lH9k3dVH0TjbgEAsb
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3c637fff56212009bf48eda208ef5888f8bac37dc9d9e7b79b3b1ca0697bd5b5.exe windows x86
a1619ec95ec9694eb196b403ce2a1869
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
SetConsoleCtrlHandler
SetStdHandle
GetOEMCP
GetACP
SetFilePointer
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
GetCurrentThread
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetModuleFileNameA
FatalAppExitA
ExitProcess
GetVersion
GetCommandLineA
HeapAlloc
CreateNamedPipeW
ConnectNamedPipe
ReadFile
WriteFile
FlushFileBuffers
DisconnectNamedPipe
CreateFileW
PulseEvent
lstrcmpiW
TerminateThread
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
GetSystemDirectoryW
GetCurrentThreadId
GetVersionExW
InitializeCriticalSection
CreateEventW
WaitForMultipleObjects
ResetEvent
DeleteCriticalSection
GetCurrentProcess
GetUserDefaultLangID
GetThreadLocale
OpenEventW
SetEvent
GetSystemPowerStatus
LocalAlloc
LocalFree
FormatMessageW
lstrlenW
SetLastError
FreeLibrary
CreateThread
EnterCriticalSection
LeaveCriticalSection
GetTickCount
lstrcmpW
WaitForSingleObject
CloseHandle
lstrcatW
Sleep
GetModuleHandleW
lstrcpyW
GetLastError
LoadLibraryW
GetProcAddress
CreateProcessW
HeapFree
RtlUnwind
MultiByteToWideChar
LoadLibraryA
GetModuleHandleA
GetVersionExA
lstrcpynW
user32
EqualRect
SystemParametersInfoW
UnregisterDeviceNotification
RegisterDeviceNotificationW
PostQuitMessage
DefWindowProcW
RegisterClassExW
CreateWindowExW
GetMessageW
DispatchMessageW
CloseWindow
PostThreadMessageW
GetWindowThreadProcessId
GetThreadDesktop
SetThreadDesktop
OpenWindowStationW
SetProcessWindowStation
ExitWindowsEx
GetLastInputInfo
OpenInputDesktop
OpenDesktopW
GetUserObjectInformationW
CloseDesktop
GetWindowRect
MonitorFromWindow
GetDesktopWindow
wsprintfW
ChangeDisplaySettingsExW
GetTopWindow
GetWindow
GetClassNameW
PostMessageW
EnumDisplaySettingsW
IsRectEmpty
FindWindowExW
GetCursorPos
GetForegroundWindow
SetCursorPos
SendMessageW
SetWindowPos
GetDC
ReleaseDC
SubtractRect
InvalidateRect
GetSystemMetrics
IntersectRect
FindWindowW
gdi32
CreateDCA
CreateDCW
ExtEscape
DeleteDC
advapi32
RegCloseKey
RegEnumValueW
ConvertStringSidToSidW
FreeSid
RegisterServiceCtrlHandlerW
SetServiceStatus
AllocateAndInitializeSid
SetEntriesInAclW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
RegSetKeySecurity
RegQueryInfoKeyW
RegEnumKeyExW
IsValidSid
RegGetKeySecurity
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetAce
GetLengthSid
InitializeAcl
AddAccessAllowedAceEx
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
OpenServiceW
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerW
CreateServiceW
CloseServiceHandle
RegOverridePredefKey
GetTokenInformation
RegOpenKeyExW
RegQueryValueExW
CreateProcessAsUserW
userenv
UnloadUserProfile
LoadUserProfileW
powrprof
CallNtPowerInformation
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE