Behavioral task
behavioral1
Sample
90ba8b7d8c5fb53eb67178b69069da8108d640c56c32937ee84aa16d85c99bbc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90ba8b7d8c5fb53eb67178b69069da8108d640c56c32937ee84aa16d85c99bbc.exe
Resource
win10v2004-20220812-en
General
-
Target
90ba8b7d8c5fb53eb67178b69069da8108d640c56c32937ee84aa16d85c99bbc
-
Size
143KB
-
MD5
3d7d576bba65b4eddfb180bd5bc34020
-
SHA1
d264e336e89444c24830f8a305b054b88e91ae85
-
SHA256
90ba8b7d8c5fb53eb67178b69069da8108d640c56c32937ee84aa16d85c99bbc
-
SHA512
efbd142ed7968ab751279d9a13b3841fbcd8bd8b0668462eda6cd947952b39e8fa232048723461f91ba594b036eaf7b9e0e9940c39c777fb576dbbceb5a65f4b
-
SSDEEP
3072:ZQRZ0MorFKNJf0be49YZym4NEi59hW/eOpbQN:ZkSMgumbnkym4trr7N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
90ba8b7d8c5fb53eb67178b69069da8108d640c56c32937ee84aa16d85c99bbc.exe windows x86
c9512f35a3f672025368a24898110b27
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
kernel32
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetLastError
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
IsWow64Process
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
CloseHandle
WaitForSingleObject
Sleep
GetCurrentThreadId
CreateThread
CreateEventW
SetEvent
GetCommandLineW
InterlockedExchange
GetVersionExA
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
user32
UnregisterClassA
PostThreadMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CharUpperW
msvcrt
_controlfp
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_errno
realloc
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_cexit
__wgetmainargs
??3@YAXPAX@Z
malloc
free
memcpy_s
wcsncpy_s
??_V@YAXPAX@Z
_purecall
??_U@YAPAXI@Z
memset
??2@YAPAXI@Z
wcscat_s
wcscpy_s
_exit
ole32
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitialize
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
SysFreeString
VarUI4FromStr
RegisterTypeLi
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocString
UnRegisterTypeLi
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE