Behavioral task
behavioral1
Sample
1a129197ed795027278dcd6fbe3b2b4d52718eee537ce4b1d5995a4454a361d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a129197ed795027278dcd6fbe3b2b4d52718eee537ce4b1d5995a4454a361d1.exe
Resource
win10v2004-20220901-en
General
-
Target
1a129197ed795027278dcd6fbe3b2b4d52718eee537ce4b1d5995a4454a361d1
-
Size
316KB
-
MD5
4101871481fc1bddf7d33904dae983b0
-
SHA1
1dd0a467cd6f302602dd8c7f49593281a017cfc9
-
SHA256
1a129197ed795027278dcd6fbe3b2b4d52718eee537ce4b1d5995a4454a361d1
-
SHA512
32743d9bd714e16c21c9f74e24584f6d8069f95d786f91cfbfd36e5a85711a30334af710021ef80a8694088e11fd1e5d7d87cc2e7543827626943f42b1f16b98
-
SSDEEP
6144:ObmYx62V3dBFKBPCEu/Cxp7chChlAyLWCuCIGK4:MmYx62FDFKBHu/CxpIhChlBLZCd4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1a129197ed795027278dcd6fbe3b2b4d52718eee537ce4b1d5995a4454a361d1.exe windows x86
f3a9742d14b1de9048040fae92380016
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
GetTickCount
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
IsBadReadPtr
HeapAlloc
HeapFree
TerminateProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProcessVersion
GlobalFlags
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetFileTime
GetFileSize
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
DuplicateHandle
lstrcpynA
SetLastError
GlobalUnlock
FindResourceA
LoadResource
LockResource
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
DeleteFileA
CopyFileA
lstrlenA
GetPrivateProfileStringA
lstrcmpA
WritePrivateProfileStringA
CreateProcessA
Sleep
GetWindowsDirectoryA
GetLastError
lstrcatA
GetVersionExA
GetCurrentProcess
FreeLibrary
LoadLibraryA
OpenProcess
GetModuleHandleA
GetProcAddress
lstrcpyA
GetVersion
WriteFile
OutputDebugStringA
FormatMessageA
LocalFree
CloseHandle
GetModuleFileNameA
UnhandledExceptionFilter
CreateFileA
user32
CharNextA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
DestroyMenu
RegisterClipboardFormatA
PostThreadMessageA
GetWindowDC
ReleaseDC
GetDC
PtInRect
GetClassNameA
ClientToScreen
GetDesktopWindow
LoadCursorA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
LoadIconA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetSysColorBrush
GetClientRect
CopyRect
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CharUpperA
wsprintfA
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
MapDialogRect
SetWindowPos
GetWindow
SetWindowContextHelpId
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
LoadStringA
GrayStringA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
FindWindowA
SendMessageA
GetSystemMetrics
RegisterClassA
UnregisterClassA
gdi32
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetViewportExtEx
GetMapMode
GetDeviceCaps
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
OleUninitialize
olepro32
ord253
oleaut32
SysStringLen
SysAllocStringByteLen
SysAllocString
VariantChangeType
VariantCopy
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE