Behavioral task
behavioral1
Sample
dc6d7d6342c2db1d8fa9fa3ef984507539b1a35ca886b820e1f2a57cfee66552.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc6d7d6342c2db1d8fa9fa3ef984507539b1a35ca886b820e1f2a57cfee66552.exe
Resource
win10v2004-20220901-en
General
-
Target
dc6d7d6342c2db1d8fa9fa3ef984507539b1a35ca886b820e1f2a57cfee66552
-
Size
151KB
-
MD5
6c9a362f85a8cfa28498b506cca87fdb
-
SHA1
b0178b4b75728d01689892254b688530e88d70b0
-
SHA256
dc6d7d6342c2db1d8fa9fa3ef984507539b1a35ca886b820e1f2a57cfee66552
-
SHA512
53fe26904f565434a99d4063389fd7914595b17f263fb4b5b5c90a9f0938b8e86328508d90b4a4bbd07694da41a7f8d36c63379d845e27a6449a617333668e7d
-
SSDEEP
3072:BSX0I4KZTQWwT8tsbBh2gW+Ysu1xS5GZs+bO8W9esLoPlHkQr8R9W:e4KJvtsbLWF71kUZs+bO8LskPRkQQ9
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dc6d7d6342c2db1d8fa9fa3ef984507539b1a35ca886b820e1f2a57cfee66552.exe windows x86
1b96e8756fc58e22b39f9aea486522af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
__p__commode
__p__fmode
memmove
_wcsicmp
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
isdigit
??3@YAXPAX@Z
atl
ord21
ord32
ord20
ord17
ord23
ord16
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
StartServiceCtrlDispatcherW
RegNotifyChangeKeyValue
RegisterServiceCtrlHandlerW
SetServiceStatus
RegCloseKey
SystemFunction036
kernel32
GetStartupInfoW
GetModuleHandleA
CreateThread
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
CreateTimerQueueTimer
ReadFile
GetCurrentProcessId
WriteFile
BindIoCompletionCallback
UnregisterWait
RegisterWaitForSingleObject
HeapAlloc
DeleteTimerQueueTimer
GetProcessHeap
HeapFree
DuplicateHandle
GetCurrentProcess
QueryPerformanceCounter
GetTickCount
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetLastError
CreateTimerQueue
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteTimerQueueEx
CloseHandle
Sleep
WaitForMultipleObjects
CreateEventW
WaitForSingleObject
SetEvent
GetCurrentThreadId
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoInitializeEx
CLSIDFromString
oleaut32
SysFreeString
SysAllocString
wsock32
getpeername
getsockname
ord1142
WSAStartup
setsockopt
WSACleanup
htons
listen
closesocket
ioctlsocket
WSAGetLastError
htonl
ord1141
bind
ntohs
ws2_32
WSAEnumNetworkEvents
WSAConnect
WSAEventSelect
WSASocketW
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 800B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE