Behavioral task
behavioral1
Sample
d03e82a5c7d60247353d8c738b7e9a0e386865becb996f658378740fbd5a7deb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d03e82a5c7d60247353d8c738b7e9a0e386865becb996f658378740fbd5a7deb.exe
Resource
win10v2004-20220812-en
General
-
Target
d03e82a5c7d60247353d8c738b7e9a0e386865becb996f658378740fbd5a7deb
-
Size
158KB
-
MD5
230848b7b38de0577ef6c596ddbd1d90
-
SHA1
74773c4a9095590482084c3570a4c98f185ea654
-
SHA256
d03e82a5c7d60247353d8c738b7e9a0e386865becb996f658378740fbd5a7deb
-
SHA512
5a22e55e0fd491fa259ef60885ac45329bca6afa262e7ec6cbcea99ed5ffa3860e3e5a13fe854da026a6770e92e7faf4a26a8ba09fd070ad03a6a3fde6673c96
-
SSDEEP
3072:5jyLrjqo4lu9ZDtUeEjhn2ohfBOV3E0XqRjH01O/KBvO5D:1yXj148ZJa2cEVU0XqRz4OYvO5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d03e82a5c7d60247353d8c738b7e9a0e386865becb996f658378740fbd5a7deb.exe windows x86
227e7723246677b9a37436cd5a616b4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_abnormal_termination
_mbsnbicmp
_mbsnbcmp
wcsncmp
wcscmp
_mbscmp
_vsnwprintf
fwprintf
_iob
_snwprintf
setlocale
_mbsicmp
_mbslwr
iswctype
memmove
wcsrchr
wcschr
_mbscpy
_wcsnicmp
_mbsinc
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
wcscpy
_wcsicmp
wcslen
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
GetUserNameW
RegDeleteValueW
kernel32
GetVersionExW
HeapFree
MoveFileExW
GetModuleFileNameW
SetLastError
GetLastError
lstrcmpW
DeleteFileA
SetThreadExecutionState
CloseHandle
CreateProcessW
GetWindowsDirectoryW
GetProcessHeap
GetModuleHandleA
GetStartupInfoA
OutputDebugStringW
CreateFileA
CreateMutexA
GetComputerNameW
SetFileAttributesA
SetFilePointer
GetCurrentThreadId
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
HeapReAlloc
HeapAlloc
ExitProcess
SetEvent
CreateEventA
FormatMessageW
FormatMessageA
LocalAlloc
LocalFree
GetWindowsDirectoryA
SetThreadLocale
GetThreadLocale
WideCharToMultiByte
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
WriteFile
ReleaseMutex
RaiseException
lstrcpyA
lstrlenA
WaitForMultipleObjects
InterlockedIncrement
InterlockedExchange
Sleep
gdi32
SelectObject
GetTextMetricsW
GetTextExtentPointW
DeleteDC
CreateDCW
user32
LoadCursorW
SetCursor
DialogBoxParamW
GetForegroundWindow
SetForegroundWindow
EndDialog
GetWindowTextW
SetWindowTextW
SetFocus
SetTimer
GetDlgItem
SendMessageW
GetWindowRect
MapDialogRect
PostMessageW
KillTimer
MessageBoxA
MessageBoxW
CharLowerW
setupapi
SetupCloseInfFile
SetupLogErrorW
SetupOpenLog
SetupCloseLog
netapi32
NetApiBufferFree
NetUserModalsGet
NetUserGetInfo
NetUserSetInfo
comctl32
InitCommonControlsEx
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE