Behavioral task
behavioral1
Sample
adade3398d532d069d9a77109b7e6c209e7821146df3a55ded4a394602b6e2d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
adade3398d532d069d9a77109b7e6c209e7821146df3a55ded4a394602b6e2d7.exe
Resource
win10v2004-20220812-en
General
-
Target
adade3398d532d069d9a77109b7e6c209e7821146df3a55ded4a394602b6e2d7
-
Size
176KB
-
MD5
6d877525d5b0d6f9814735975dad49d0
-
SHA1
ff68da093f42750688d786db68506b30905720d5
-
SHA256
adade3398d532d069d9a77109b7e6c209e7821146df3a55ded4a394602b6e2d7
-
SHA512
c3571a5cea38d4f6f9da2f762dbeea8c1d8b86aa91e3079fc6ad5fc8388838d0a1805953c8b2fe58d6e744e2fac98012217e941aa65806d4a57fa91a6b3dcb85
-
SSDEEP
3072:1ieym0as5Al/NsuFtysdWI/v90LtiNRhYXiZdBk9+3r0/v:wm0IN8sdh/vUE1bBlo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
adade3398d532d069d9a77109b7e6c209e7821146df3a55ded4a394602b6e2d7.exe windows x86
c062542419a816c407b09c909072a761
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dsound
ord2
ord1
setupapi
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInstanceIdA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
kernel32
SetFilePointer
GetLastError
LocalFree
LocalAlloc
DeviceIoControl
WriteConsoleA
CreateFileA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CloseHandle
GetProcAddress
GetModuleHandleA
ExitProcess
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LoadLibraryA
InitializeCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
RtlUnwind
HeapSize
VirtualAlloc
user32
SendMessageA
RegisterWindowMessageA
EnumWindows
GetWindowTextA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE