Behavioral task
behavioral1
Sample
f649bebc887bce324fa4202a5e24ca7cd5341e1f1de2564c9aafaf0cb8b1badd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f649bebc887bce324fa4202a5e24ca7cd5341e1f1de2564c9aafaf0cb8b1badd.exe
Resource
win10v2004-20220901-en
General
-
Target
f649bebc887bce324fa4202a5e24ca7cd5341e1f1de2564c9aafaf0cb8b1badd
-
Size
376KB
-
MD5
2b4679db2a42dfebbc32dc20f6e8da15
-
SHA1
7e35ed2e5257b0454efed2eb743e9c3e7d3efd3f
-
SHA256
f649bebc887bce324fa4202a5e24ca7cd5341e1f1de2564c9aafaf0cb8b1badd
-
SHA512
76179b969d96dde691398fab9707725f0f22a80bc38e24e2c868cdc2e3e9013b70a547af5996524bf3f961218353d06da1d571c41fe814d3e17dfd27ba2c8fae
-
SSDEEP
6144:bySq4o2y1FAySq4o2y1FWud0rxreDdN4Ih5t51Eq8o:CH1FH1kuGNUYIeo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f649bebc887bce324fa4202a5e24ca7cd5341e1f1de2564c9aafaf0cb8b1badd.exe windows x86
82cf1f63606a7678e8592e30cecf9d7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetLastError
GetModuleFileNameA
WaitForSingleObject
CloseHandle
Sleep
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
LCMapStringA
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetFilePointer
GetConsoleCP
GetConsoleMode
LoadLibraryA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE