Behavioral task
behavioral1
Sample
50c284f8162837315a14e094a999676326f249dc4a681118906179853dc76d9b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
50c284f8162837315a14e094a999676326f249dc4a681118906179853dc76d9b.exe
Resource
win10v2004-20220901-en
General
-
Target
50c284f8162837315a14e094a999676326f249dc4a681118906179853dc76d9b
-
Size
280KB
-
MD5
5d79770ff0d2dff666941f62c4b76fd0
-
SHA1
e4a32dcd8ee66115a5aaabcababc41409314939d
-
SHA256
50c284f8162837315a14e094a999676326f249dc4a681118906179853dc76d9b
-
SHA512
d2b8d7abd60b235ebc055a9c1943d26de38aecefaa26883602ddc841fedbc25c64c703e52697f9ae321e71dcae5cf3004ff2a9b4491c7f46e07212a770b31800
-
SSDEEP
6144:PQ7Tt2Emcm/lXmJffIumSRpwW2r3LvY/MJTBqPOJEvdUkbo66uqZ715HNnsNBR:C0emdXmJffIumSRpwWI3LXTsPtSkE75Q
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
50c284f8162837315a14e094a999676326f249dc4a681118906179853dc76d9b.exe windows x86
4cca2ac213fec13ccc08f7a39982c4db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
mfc71
ord2322
ord4580
ord297
ord781
ord784
ord310
ord3684
ord5731
ord911
ord5403
ord2468
ord1489
ord6118
ord2902
ord299
ord2933
ord3210
ord1934
ord2368
ord3204
ord1280
ord2367
ord2372
ord1903
ord2095
ord1591
ord5915
ord1402
ord4240
ord5214
ord2991
ord4261
ord3317
ord572
ord741
ord2131
ord563
ord753
ord6065
ord3401
ord3761
ord5613
ord1123
ord1009
ord3934
ord6255
ord4541
ord3683
ord757
ord266
ord265
ord1482
ord762
ord1063
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord876
ord4081
ord631
ord2280
ord386
ord1054
ord1122
ord2248
ord6090
ord4353
ord870
ord2371
ord2086
ord1545
ord4232
ord3164
ord587
ord2092
ord1641
ord1571
ord4238
ord2958
ord3230
ord658
ord1643
ord1581
ord3292
ord715
ord664
ord427
ord304
ord1892
ord4749
ord709
ord501
ord5431
ord2164
ord6236
ord2657
ord5873
ord3023
ord3875
ord4035
ord4067
ord744
ord556
ord5490
ord5470
ord1917
ord655
ord3997
ord5563
ord5529
ord4108
ord5286
ord3733
ord5111
ord421
ord1440
ord2748
ord3931
ord2288
ord5491
ord865
ord3441
ord629
ord384
ord907
ord383
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord6067
ord578
ord1794
ord764
ord1084
ord354
ord605
ord3182
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3641
ord566
ord1207
ord912
msvcr71
_stricmp
_strlwr
_strnicmp
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
__security_error_handler
memset
memcpy
_filelengthi64
fsetpos
fgetpos
fread
fprintf
exit
fopen
_iob
fclose
fwrite
_purecall
_CxxThrowException
_except_handler3
malloc
tolower
_strdup
free
atoi
_beginthreadex
div
strrchr
strncmp
strchr
isdigit
sprintf
strstr
_mbsstr
_setmbcp
__CxxFrameHandler
kernel32
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
lstrcpyA
WinExec
lstrlenA
Process32Next
CloseHandle
OpenProcess
TerminateProcess
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
Module32Next
Module32First
Sleep
GetPrivateProfileStringA
GetVersionExA
CreateProcessA
CreateDirectoryA
GetFileAttributesA
RemoveDirectoryA
DeleteFileA
CopyFileA
WriteFile
CreateFileA
MoveFileA
lstrcmpiA
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
user32
SetCursor
EnableWindow
InflateRect
GetSystemMetrics
BringWindowToTop
IsIconic
GetSystemMenu
PtInRect
DrawIcon
DestroyIcon
FindWindowA
PostMessageA
GetWindowLongA
SendMessageA
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
SetWindowLongA
MessageBeep
IsWindow
ReleaseCapture
GetSysColor
GetParent
SetCapture
RedrawWindow
InvalidateRect
ReleaseDC
GetDC
LoadCursorA
AppendMenuA
LoadIconA
GetClientRect
GetWindowRect
CopyIcon
gdi32
GetObjectA
GetTextExtentPoint32A
CreateFontIndirectA
GetStockObject
advapi32
RegEnumKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
ws2_32
WSAStartup
msvcp71
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEABDI@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE