Behavioral task
behavioral1
Sample
4d10f794556baee75c595dbe1229eaed03e98b62eebcf21d01048e3c074637a7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4d10f794556baee75c595dbe1229eaed03e98b62eebcf21d01048e3c074637a7.exe
Resource
win10v2004-20220812-en
General
-
Target
4d10f794556baee75c595dbe1229eaed03e98b62eebcf21d01048e3c074637a7
-
Size
39KB
-
MD5
6c17ebb73808998d8d6783631ca1e82f
-
SHA1
0e7625c5b7cece51e2a79ae2f837dfd688062ac9
-
SHA256
4d10f794556baee75c595dbe1229eaed03e98b62eebcf21d01048e3c074637a7
-
SHA512
0fba044b5a2fc5af4f13f72a8fc868fa583c7f5cbbd4f72cce0daff92f384d4a09d0890d2b366ca65532c6f9745a862c982fef1ce191dcdb95a1d8663a0a31d3
-
SSDEEP
384:OvGWLL8o3Sh/FUNd3pSGggvfZWPygHmi/yWaLWkW0oDemr9MZp:Ov8o3Sh/FIpSGJBYfHb6QemBWp
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4d10f794556baee75c595dbe1229eaed03e98b62eebcf21d01048e3c074637a7.exe windows x86
90924b5a9301fb53805e029ca0faab27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
ExitProcess
GetSystemInfo
GetProcAddress
LoadLibraryA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
Sleep
lstrlenA
lstrcmpiA
GetModuleHandleA
GlobalAlloc
GetTempFileNameA
GetTempPathA
GlobalFree
DeleteFileA
MoveFileExA
FreeLibrary
SetFileTime
GetFileTime
GetWindowsDirectoryA
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualQuery
GetVersionExA
RtlUnwind
IsDebuggerPresent
rpcrt4
UuidToStringA
UuidCreate
user32
wsprintfA
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE