Behavioral task
behavioral1
Sample
075395a79896baf6e6f231947bf18b4f1bbfe467c0b143a01c49ee1986ceb2b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
075395a79896baf6e6f231947bf18b4f1bbfe467c0b143a01c49ee1986ceb2b2.exe
Resource
win10v2004-20220901-en
General
-
Target
075395a79896baf6e6f231947bf18b4f1bbfe467c0b143a01c49ee1986ceb2b2
-
Size
276KB
-
MD5
6d5d6063d995bc37bf148cd126ea91bc
-
SHA1
0f9810196536187e9f67d0121f3679dad21dca52
-
SHA256
075395a79896baf6e6f231947bf18b4f1bbfe467c0b143a01c49ee1986ceb2b2
-
SHA512
f262e4da32713996706000c7cf124d51b1d1edd0914fdf33f586a8763e65a0a31924ed108275259fbfcbae6b3945251d608c46af6798631ba88d81d4a3845836
-
SSDEEP
6144:B4P885qxrnbQR8vhTcqHR18lGk9mi+BAENW958AwV:Ba8VxDbbvhpHuGfZBAR51wV
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
075395a79896baf6e6f231947bf18b4f1bbfe467c0b143a01c49ee1986ceb2b2.exe windows x86
3ff5a8be29653527e738cd256f4d599f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
CreateMutexA
GetProcAddress
user32
GetSystemMetrics
GetMenuItemCount
AppendMenuW
InvalidateRgn
SetForegroundWindow
SetDlgItemTextW
SetActiveWindow
SetMenu
CreateAcceleratorTableA
DefWindowProcA
OffsetRect
RegisterClassW
GetCapture
RegisterClassExW
SetFocus
IsMenu
DialogBoxIndirectParamA
IsIconic
GetMenuItemInfoW
GetCursorPos
GetDesktopWindow
CheckMenuItem
DestroyIcon
LoadBitmapA
GetClassInfoW
CreateWindowExA
MessageBoxW
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
polstore
IPSecFreePolStr
IPSecFreeMulNFAData
IPSecUnassignPolicy
IPSecEnumISAKMPData
IPSecFreeISAKMPData
IPSecEnumPolicyData
IPSecFreeFilterSpec
IPSecGetAssignedPolicyData
IPSecFreeMulNegPolData
gdi32
CreateFontIndirectExW
RemoveFontResourceW
CreateDIBSection
CreateSolidBrush
CreateHatchBrush
CreatePen
CreatePatternBrush
CreateRoundRectRgn
GetMetaFileA
cryptnet
LdapProvOpenStore
Sections
UPX1 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Lc Size: 512B - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vB Size: 5KB - Virtual size: 828KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gNvPZC Size: 4KB - Virtual size: 899KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m Size: 512B - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cFGdVt Size: 4KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 78KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VkTI Size: 1024B - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 145KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nLiuI Size: 2KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ