Behavioral task
behavioral1
Sample
39780fc625d41c2740a1fd75ab96706585c82a9ca216d47f40a975771bdc22e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39780fc625d41c2740a1fd75ab96706585c82a9ca216d47f40a975771bdc22e3.exe
Resource
win10v2004-20220812-en
General
-
Target
39780fc625d41c2740a1fd75ab96706585c82a9ca216d47f40a975771bdc22e3
-
Size
165KB
-
MD5
0108396f89323ed95dc59e903cd4d32e
-
SHA1
026d9aea716126d20cf4d174acd5b6a8e8ec5283
-
SHA256
39780fc625d41c2740a1fd75ab96706585c82a9ca216d47f40a975771bdc22e3
-
SHA512
f32ed235286ce4f85aafb59aa07482fb2b6ca0ae3966fb2903109b411c4eaee9641005c23690e6a58e85ab6366f7c979c6a7f21d58eca2638d93586bcfa5e3cf
-
SSDEEP
3072:eduIrM4nYVI3VTpV2Cj1woqqWlzTGWdbBZaUSQCVspHtVr7P5EgqZ:euAM4nYVqVTpVXRwNlzPdbBZaRsZZdK
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
39780fc625d41c2740a1fd75ab96706585c82a9ca216d47f40a975771bdc22e3.exe windows x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 109KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE