Behavioral task
behavioral1
Sample
10039a6aea66a92f4f753add243f9642a7cc49268a58700803b66ec9fe3344ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
10039a6aea66a92f4f753add243f9642a7cc49268a58700803b66ec9fe3344ba.exe
Resource
win10v2004-20220812-en
General
-
Target
10039a6aea66a92f4f753add243f9642a7cc49268a58700803b66ec9fe3344ba
-
Size
220KB
-
MD5
7c6890aa018bb9daab5f0eaf6719dc30
-
SHA1
e108cde775d0be828371994461233a73674da8c3
-
SHA256
10039a6aea66a92f4f753add243f9642a7cc49268a58700803b66ec9fe3344ba
-
SHA512
8c403352f421a1ce18962a3de01d95d2a4c973b784b7046e9fa50e6b0d8da8850319384346e7a0cd3492f9cef0f3d1c1eebdbaa45ec9c3895154190b2731cb9b
-
SSDEEP
3072:EtyJreYV2+SDHxamJ/vVpsTC6b6odZXTbIDXQnsNWfX3G5ngwUY:EcJn6DHYmJFF6vZHwAnsNy3G5R
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
10039a6aea66a92f4f753add243f9642a7cc49268a58700803b66ec9fe3344ba.exe windows x86
690c9e79bb34f8d71799aa65a51d3c5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
GetSystemDefaultLCID
GetProcAddress
GetTempFileNameA
MulDiv
CreateProcessA
WaitForSingleObject
GetStartupInfoA
IsDBCSLeadByte
Sleep
CompareStringA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
FreeLibrary
RemoveDirectoryA
FindNextFileA
WritePrivateProfileSectionA
WritePrivateProfileStringA
lstrcpynA
GetPrivateProfileSectionA
WriteFile
DeleteFileA
LocalAlloc
LockResource
LoadResource
FindResourceA
SizeofResource
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
MultiByteToWideChar
lstrcmpiA
GetDiskFreeSpaceA
HeapAlloc
GetProcessHeap
HeapFree
GetModuleFileNameA
ExitProcess
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFileAttributesA
GetFileSize
ReadFile
SetFilePointer
FindFirstFileA
CreateDirectoryA
GetLastError
GetPrivateProfileStringA
FindClose
GetFileAttributesA
lstrcatA
lstrlenA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
GetTempPathA
MoveFileExA
LoadLibraryA
LocalFree
GetShortPathNameA
FlushFileBuffers
CloseHandle
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
RtlUnwind
user32
GetParent
GetDlgItem
SendDlgItemMessageA
EnableWindow
CheckRadioButton
SetWindowTextA
GetWindowTextA
LoadStringA
LoadImageA
MessageBoxA
IsDlgButtonChecked
GetDlgItemTextA
SetDlgItemTextA
ReleaseDC
GetDC
GetWindowLongA
SetFocus
PostMessageA
GetWindow
wsprintfA
GetDesktopWindow
DestroyWindow
CreateDialogParamA
DispatchMessageA
TranslateMessage
GetSysColor
GetSysColorBrush
FillRect
BeginPaint
DrawTextA
EndPaint
GetClientRect
ScreenToClient
MoveWindow
SetParent
MapDialogRect
GetNextDlgTabItem
GetWindowRect
CreateDialogIndirectParamA
IsWindow
InvalidateRect
IsWindowEnabled
ShowWindow
UpdateWindow
IsDialogMessageA
SetWindowPos
GetActiveWindow
SetActiveWindow
CharNextA
LoadIconA
SendMessageA
PeekMessageA
SetWindowLongA
gdi32
DeleteObject
CreatePalette
RealizePalette
GetDeviceCaps
CreateDIBitmap
GetObjectA
SelectPalette
EnumFontFamiliesExA
GetTextExtentPointA
GetStockObject
TextOutA
DeleteDC
SelectObject
CreateCompatibleDC
SetBkMode
BitBlt
SetTextColor
CreateSolidBrush
SetBkColor
CreateFontIndirectA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
lz32
LZOpenFileA
LZCopy
LZClose
comctl32
ord17
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE