Behavioral task
behavioral1
Sample
16272c5cceb34038ee171973c0790de434114754c9a4fbe6b841528e8d3b6cc1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
16272c5cceb34038ee171973c0790de434114754c9a4fbe6b841528e8d3b6cc1.exe
Resource
win10v2004-20220901-en
General
-
Target
16272c5cceb34038ee171973c0790de434114754c9a4fbe6b841528e8d3b6cc1
-
Size
571KB
-
MD5
6afd764fab95161c8bac276599548e0e
-
SHA1
c678a61c1fea196194b80f8c79c02ea6db9e3344
-
SHA256
16272c5cceb34038ee171973c0790de434114754c9a4fbe6b841528e8d3b6cc1
-
SHA512
67b02ca7955fee4fd1933d01fcdc57de803a60b46b9f0caaf852dbfd95b4a75beedc3082ae170d753c4c70ba5af37ac2cb3329576fc7494224e8cd209b8d35b8
-
SSDEEP
12288:4EZPxgg8YuejgTBmO4uSeK+fVlX3/VaO5V3:4EVxgg8Yue8t7WkVlXvVn
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
16272c5cceb34038ee171973c0790de434114754c9a4fbe6b841528e8d3b6cc1.exe windows x86
2f0f41cb27dbf82d68f2f5394511a6a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord23
ord21
ord20
ord22
ord18
ord17
ord16
ord32
kernel32
SetEvent
InterlockedDecrement
CloseHandle
WaitForSingleObject
CreateThread
CreateEventA
GetSystemWindowsDirectoryA
Sleep
lstrcmpiA
GetCurrentThreadId
GetCommandLineA
SetUnhandledExceptionFilter
FreeLibrary
GetProcAddress
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
LeaveCriticalSection
IsBadCodePtr
EnterCriticalSection
TerminateThread
ResetEvent
WideCharToMultiByte
MultiByteToWideChar
WaitForMultipleObjects
lstrlenA
GetLastError
GlobalAlloc
GlobalFree
lstrlenW
GetTickCount
GetModuleHandleA
GetStartupInfoA
user32
CharNextA
PostThreadMessageA
GetMessageA
PeekMessageA
MsgWaitForMultipleObjects
UnregisterClassA
DestroyWindow
PostMessageA
DefWindowProcA
CreateWindowExA
RegisterClassA
DispatchMessageA
ole32
CoUninitialize
CoResumeClassObjects
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoTaskMemRealloc
CoSuspendClassObjects
oleaut32
SafeArrayAccessData
SysAllocString
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
SafeArrayDestroy
SysAllocStringLen
SysStringLen
VariantInit
SafeArrayCreate
SafeArrayUnaccessData
VariantClear
SysFreeString
SysStringByteLen
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??_7out_of_range@std@@6B@
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
msvcrt
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
atof
time
localtime
_initterm
free
wcscpy
strcmp
memcmp
wcstombs
_ftol
fabs
floor
strncpy
strchr
wcslen
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??0exception@@QAE@ABV0@@Z
strcat
strlen
memcpy
??2@YAPAXI@Z
_purecall
memset
_CxxThrowException
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE