Behavioral task
behavioral1
Sample
f3b8fe8c8fc36b001e4faa0e2cdf85016ca8ffd757f88bf7a992763207fb0b3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3b8fe8c8fc36b001e4faa0e2cdf85016ca8ffd757f88bf7a992763207fb0b3b.exe
Resource
win10v2004-20220812-en
General
-
Target
f3b8fe8c8fc36b001e4faa0e2cdf85016ca8ffd757f88bf7a992763207fb0b3b
-
Size
158KB
-
MD5
5c29604e82bb4e674bfa4df169eb3e71
-
SHA1
7c9510bb31d32ed42e775faa4f913168a1218df3
-
SHA256
f3b8fe8c8fc36b001e4faa0e2cdf85016ca8ffd757f88bf7a992763207fb0b3b
-
SHA512
e5dc6f577dd0a2e19de9bc22a00509af306efe242178fa8a61ad1290a9be643d532a84f17d5f957c7f0beeb3af2df42256cba0e41b849be85e928a624acd7307
-
SSDEEP
3072:lmU0l/VHdXiD0TaOPyp8tGavYjTGPiU/bBYkCuDIuLUN3SuQH8tOMgb:l85XiD0TaO/hvYGquDI93xQH8tm
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f3b8fe8c8fc36b001e4faa0e2cdf85016ca8ffd757f88bf7a992763207fb0b3b.exe windows x86
c11a2b7b09fa29f247e74262b3718b0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityW
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
GetSecurityInfo
InitializeSecurityDescriptor
GetTokenInformation
AddAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
GetFileSecurityW
FreeSid
LookupAccountNameW
AllocateAndInitializeSid
CheckTokenMembership
kernel32
CloseHandle
OpenProcess
GetCurrentProcessId
GetLastError
GetComputerNameW
LocalFree
CreateFileW
GetVolumeInformationW
GetVolumePathNameW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentDirectoryW
ReadFile
FlushConsoleInputBuffer
SetConsoleMode
GetConsoleMode
GetStdHandle
GetFileAttributesW
GetFullPathNameW
HeapSetInformation
SetThreadUILanguage
SetLastError
GetComputerNameExW
GetModuleFileNameW
ExitProcess
GetConsoleOutputCP
WriteConsoleW
ReadConsoleW
HeapReAlloc
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
CompareStringW
lstrlenW
lstrlenA
GetFileType
VerSetConditionMask
VerifyVersionInfoW
FormatMessageW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
wcsrchr
wcspbrk
_wcsicmp
memcpy
memset
wcstok
_iob
_vsnwprintf
_memicmp
_get_osfhandle
_errno
_fileno
toupper
wcstod
wcstoul
wcstol
fflush
fprintf
__iob_func
user32
CharUpperW
LoadStringW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
secur32
GetUserNameExW
ws2_32
WSACleanup
GetNameInfoW
GetAddrInfoW
WSAGetLastError
WSAStartup
FreeAddrInfoW
shlwapi
StrStrIW
StrStrW
StrChrIW
StrChrW
netapi32
NetServerGetInfo
NetApiBufferFree
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE