Behavioral task
behavioral1
Sample
eb877e877087f3bf8955d4b6b9a26ba8eb28b1d365ddeccc6d86c001a33b7be6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb877e877087f3bf8955d4b6b9a26ba8eb28b1d365ddeccc6d86c001a33b7be6.exe
Resource
win10v2004-20220812-en
General
-
Target
eb877e877087f3bf8955d4b6b9a26ba8eb28b1d365ddeccc6d86c001a33b7be6
-
Size
256KB
-
MD5
5e1e770e0c5291e9700ec58b35b6643a
-
SHA1
bbb05f94c838b7fa298a7c8c15e4b632226281ea
-
SHA256
eb877e877087f3bf8955d4b6b9a26ba8eb28b1d365ddeccc6d86c001a33b7be6
-
SHA512
806179ea6847c2f91d56419d7f198a364c0b0f096f64b87b758e5fd3207252dedf4a44bc7aed38b1ec22aa8c8b8d514df33d6ccdeb7a3071573a35f35cc12ad4
-
SSDEEP
6144:sqNEtk09erofbPz/7zR6m4vZACda2xGxine+LFL6:sq+tk8erof3R6m4hACdaTxinfLF6
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
eb877e877087f3bf8955d4b6b9a26ba8eb28b1d365ddeccc6d86c001a33b7be6.exe windows x86
cf2b62edf589c4764b84292dc4b11128
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
LocalAlloc
TerminateThread
ResetEvent
WaitForSingleObject
CreateThread
CreateEventA
SetEvent
GetModuleFileNameA
FlushFileBuffers
SetStdHandle
LoadLibraryA
SetFilePointer
RaiseException
IsBadReadPtr
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
DeleteCriticalSection
InitializeCriticalSection
GetLastError
CreateNamedPipeA
ConnectNamedPipe
CloseHandle
ReadFile
GetDriveTypeA
WriteFile
DisconnectNamedPipe
WideCharToMultiByte
GetVersionExA
MultiByteToWideChar
GetLocaleInfoA
GetACP
InterlockedExchange
IsBadCodePtr
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
HeapSize
IsBadWritePtr
VirtualFree
HeapCreate
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
GetProcAddress
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
HeapDestroy
user32
DialogBoxParamA
DestroyWindow
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
EndDialog
KillTimer
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetTimer
advapi32
LookupAccountSidA
OpenServiceA
ControlService
DeleteService
OpenSCManagerA
CreateServiceA
StartServiceA
CloseServiceHandle
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
AllocateAndInitializeSid
FreeSid
LookupAccountNameA
GetFileSecurityA
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
AddAce
AddAccessAllowedAce
SetFileSecurityA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shlwapi
PathBuildRootA
setupapi
SetupDiSetClassInstallParamsA
SetupDiCallClassInstaller
SetupDiGetDeviceInstallParamsA
SetupDiGetDeviceRegistryPropertyA
SetupDiSetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE