Behavioral task
behavioral1
Sample
85669929b1c31ea85c6c2d47b5cff9c185ed7c532379e3891cf2c28238071d0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
85669929b1c31ea85c6c2d47b5cff9c185ed7c532379e3891cf2c28238071d0e.exe
Resource
win10v2004-20220812-en
General
-
Target
85669929b1c31ea85c6c2d47b5cff9c185ed7c532379e3891cf2c28238071d0e
-
Size
340KB
-
MD5
60467fa54f3e43f4df17a9dd27577d50
-
SHA1
0475a75d28290809b507434068fb55b4b6cf76eb
-
SHA256
85669929b1c31ea85c6c2d47b5cff9c185ed7c532379e3891cf2c28238071d0e
-
SHA512
f4d8f7954d3d5ef41f59d4a46de8fb36bb4a9d25edfa2c0f00e3d7a04787519affc4bc50c0a4870716b7b8ea53b22570ac8ae97ceeedc52115c548906dbbe35c
-
SSDEEP
3072:+tPhcwZsA/Ccc1ld/4YIzVOhmViGHLgwmUyq/HyWgZqaeVOc0McU/9SnGsKQfFce:8/tA3/4YIJ8m1MxUyRzoVOBlYQflIG
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
85669929b1c31ea85c6c2d47b5cff9c185ed7c532379e3891cf2c28238071d0e.exe windows x86
69404db7be3e56fa72b273fa273ba329
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
SetThreadPriority
WinExec
GetProcAddress
ReleaseMutex
FreeLibrary
OpenMutexA
GetVersionExA
UnmapViewOfFile
GetACP
lstrcpyA
lstrlenA
WaitForSingleObject
ResetEvent
CloseHandle
DeviceIoControl
GetTickCount
Sleep
CreateThread
CreateFileA
CreateMutexA
CreateFileMappingA
CreateEventA
lstrcpynA
LoadLibraryA
MapViewOfFile
GetStringTypeW
LCMapStringA
MultiByteToWideChar
LCMapStringW
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
HeapAlloc
RtlUnwind
HeapFree
WriteFile
HeapCreate
HeapDestroy
VirtualFree
GetFileType
GetStdHandle
GetEnvironmentVariableA
GetEnvironmentStringsW
GetStringTypeA
ExitThread
SetHandleCount
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetEnvironmentStrings
user32
PostMessageA
EnumChildWindows
GetAsyncKeyState
SendMessageA
GetKeyState
GetClassNameA
GetWindowRect
GetCursorPos
PtInRect
ChildWindowFromPoint
GetParent
WindowFromPoint
FillRect
DrawIconEx
GetDC
ReleaseDC
GetSysColor
AppendMenuA
DestroyIcon
SetSystemCursor
DestroyWindow
GetWindowLongA
CreatePopupMenu
FindWindowA
SetForegroundWindow
DestroyMenu
ClientToScreen
TrackPopupMenu
MessageBoxA
PostQuitMessage
DefWindowProcA
RegisterClassExA
LoadIconA
LoadCursorA
GetMessageA
CreateWindowExA
ShowWindow
GetDesktopWindow
TranslateMessage
DispatchMessageA
GetWindowTextA
GetForegroundWindow
SystemParametersInfoA
GetSystemMetrics
LoadImageA
gdi32
TextOutA
GetBkColor
SetTextColor
DeleteObject
CreateSolidBrush
SetBkColor
SetTextAlign
GetTextExtentPoint32A
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
shell32
Shell_NotifyIconA
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE