Behavioral task
behavioral1
Sample
d4294fb60b3202be0dcf23c78a3f7785cf4b60cf592931abb144850b55b74fd3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4294fb60b3202be0dcf23c78a3f7785cf4b60cf592931abb144850b55b74fd3.exe
Resource
win10v2004-20220812-en
General
-
Target
d4294fb60b3202be0dcf23c78a3f7785cf4b60cf592931abb144850b55b74fd3
-
Size
16KB
-
MD5
65d551267d3ac3afebd0f943a9b2cec4
-
SHA1
6bdfee5715169089a4e376ac65c5bdf40c0114f8
-
SHA256
d4294fb60b3202be0dcf23c78a3f7785cf4b60cf592931abb144850b55b74fd3
-
SHA512
b2db1dab1f090cc2b15fccfa7dc95a5dc86d7f00feecbba8e5da6883ee8f7b03828aba99d3614b2da144af284e75a8c433292a70f0e572e69c51c1c0d0b7e409
-
SSDEEP
192:U/gPOSURWyCkueosQ4Lbi9SlirPuZ1IvofJitw//QkjyFoe4CDx:U/08Rj31osQ4PiolirPVoRitwxeaevt
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d4294fb60b3202be0dcf23c78a3f7785cf4b60cf592931abb144850b55b74fd3.exe windows x86
198217f39a1b31368681bed82723db34
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LoadLibraryA
GetProcAddress
ExitProcess
msvcrt
_iob
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE