Behavioral task
behavioral1
Sample
c0294466e45b2bbf602f0cf18cba6421f39659907ac2a328d0aec4a5ddc9b07f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0294466e45b2bbf602f0cf18cba6421f39659907ac2a328d0aec4a5ddc9b07f.exe
Resource
win10v2004-20220812-en
General
-
Target
c0294466e45b2bbf602f0cf18cba6421f39659907ac2a328d0aec4a5ddc9b07f
-
Size
164KB
-
MD5
6e3f4d813996dc6f4f1ce8050254ab3e
-
SHA1
9854f67c9af274a873d9a0219f30d37a34da2f1a
-
SHA256
c0294466e45b2bbf602f0cf18cba6421f39659907ac2a328d0aec4a5ddc9b07f
-
SHA512
a39669a189eaed4f4ad3c2e0a39b39860d5645d1d98239972fcf3f776407622cc7a7becf658205aa2be67f9c1f7f4897b72e43160f09602de3bf47599ae30275
-
SSDEEP
3072:SiYXcQo6PwNX634PPMOdubCfT8UK7nX7pY:bmoB634PEaubwsFY
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c0294466e45b2bbf602f0cf18cba6421f39659907ac2a328d0aec4a5ddc9b07f.exe windows x86
ee919216e40ad533850f93e089aa734e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dsound
ord1
setupapi
SetupDiGetDeviceInstanceIdA
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
kernel32
CloseHandle
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
lstrcpyA
CreateFileA
DeviceIoControl
LocalAlloc
LocalFree
WaitForMultipleObjects
SetEvent
WaitForSingleObject
WinExec
lstrcmpA
Sleep
CreateMutexA
GetLastError
GetStringTypeW
CreateEventA
CreateThread
user32
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
LoadStringA
LoadImageA
FindWindowA
CharUpperA
BeginPaint
FillRect
EndPaint
SetTimer
GetSysColor
SystemParametersInfoA
GetDC
GetMenuCheckMarkDimensions
ReleaseDC
CreatePopupMenu
InsertMenuItemA
SendMessageA
GetCursorPos
TrackPopupMenu
DestroyMenu
KillTimer
PostQuitMessage
SetForegroundWindow
DefWindowProcA
RegisterWindowMessageA
GetDesktopWindow
GetWindow
GetClassNameA
PostMessageA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetWindowRgn
gdi32
FrameRgn
CreateCompatibleDC
BitBlt
DeleteDC
CreatePen
MoveToEx
LineTo
CreateBrushIndirect
Rectangle
GetTextColor
SetTextColor
GetBkMode
SetBkMode
GetTextAlign
SetTextAlign
ExtTextOutA
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
DeleteObject
CreateRoundRectRgn
CreatePolygonRgn
CombineRgn
advapi32
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
shell32
Shell_NotifyIconA
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE