Behavioral task
behavioral1
Sample
abde85a51a2b35fdce7ecbf43ed8a73d81b6bc0d71a0407dafdddbfbebfe300d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abde85a51a2b35fdce7ecbf43ed8a73d81b6bc0d71a0407dafdddbfbebfe300d.exe
Resource
win10v2004-20220812-en
General
-
Target
abde85a51a2b35fdce7ecbf43ed8a73d81b6bc0d71a0407dafdddbfbebfe300d
-
Size
376KB
-
MD5
14d910246fc59b91db5a85875262ee20
-
SHA1
f352038d515dc5ff8e006a9bf607dea5ed1e8aa9
-
SHA256
abde85a51a2b35fdce7ecbf43ed8a73d81b6bc0d71a0407dafdddbfbebfe300d
-
SHA512
95067f378d7e4632d7e2fb955e091dc0cc386be7cc4d7a89c5614160589b13cec280d6290089fbaaf4a567334ce54871efb75531c3af779893245db1c4dc086e
-
SSDEEP
6144:4sG3uKOPhl7W/j4vUUVjEgnUi2Alyy3TBxg6JWA3DUv80LopUJNsd+Q2S/li0x:/Au7z7W/j4vUfgUffy3N+6JWA3DUXopf
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
abde85a51a2b35fdce7ecbf43ed8a73d81b6bc0d71a0407dafdddbfbebfe300d.exe windows x86
ae86754bb665b147e706efc531717f79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAStartup
htons
WSACleanup
inet_ntoa
gethostname
ntohs
socket
setsockopt
closesocket
sendto
bind
WSAIoctl
recv
inet_addr
gethostbyname
WSAGetLastError
kernel32
SetEndOfFile
GetCPInfo
SetErrorMode
RtlUnwind
RaiseException
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
CreateThread
ExitThread
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
GetOEMCP
FlushFileBuffers
SetUnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
IsBadReadPtr
IsBadCodePtr
SetStdHandle
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
ReadFile
SetFilePointer
WriteFile
CreateFileA
GetCurrentProcess
SizeofResource
GetProcessVersion
WritePrivateProfileStringA
TlsGetValue
GlobalFlags
lstrcpynA
EnterCriticalSection
LocalReAlloc
TlsSetValue
TlsFree
GlobalReAlloc
LeaveCriticalSection
TlsAlloc
GlobalHandle
DeleteCriticalSection
LocalAlloc
InitializeCriticalSection
LocalFree
GetVersion
MulDiv
LoadLibraryA
GlobalAddAtomA
lstrcatA
GlobalGetAtomNameA
GetModuleHandleA
GlobalFindAtomA
lstrcpyA
GetProcAddress
InterlockedExchange
SetLastError
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetLastError
GetProfileStringA
user32
GetMenu
GetMenuItemCount
GetSubMenu
RegisterClassA
WinHelpA
GetCapture
GetClassInfoA
GetTopWindow
wsprintfA
CopyRect
ScreenToClient
AdjustWindowRectEx
SetFocus
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
GetSysColor
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
ReleaseDC
GetMenuItemID
InvalidateRect
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
EnableWindow
LoadIconA
IsWindow
SetActiveWindow
GetMenuState
LoadBitmapA
SetForegroundWindow
InflateRect
DefDlgProcA
CharNextA
DrawFocusRect
ExcludeUpdateRgn
ShowCaret
HideCaret
UnregisterClassA
IsWindowUnicode
gdi32
GetTextExtentPointA
PatBlt
CreateCompatibleDC
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
CreateDIBitmap
BitBlt
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
comctl32
ord17
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE