Behavioral task
behavioral1
Sample
e0bd2e82197201cb58a79089795c5c194f36509f83b4625241f8626b36a1e51d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e0bd2e82197201cb58a79089795c5c194f36509f83b4625241f8626b36a1e51d.exe
Resource
win10v2004-20220901-en
General
-
Target
e0bd2e82197201cb58a79089795c5c194f36509f83b4625241f8626b36a1e51d
-
Size
149KB
-
MD5
15bcdf9b6ee3438af777b9f9ce06871e
-
SHA1
209e0cbeb545d05cff4e5da7e296c85d4cbd5392
-
SHA256
e0bd2e82197201cb58a79089795c5c194f36509f83b4625241f8626b36a1e51d
-
SHA512
fff17167444ea288e58cf0d4aa68ecc37d4e81e2ba5d19b83d9127a04901259e5d082aed368db300b4c8ec4ce83bbdb3f509b1dd6a9c582c22ebc7b7ca916a7b
-
SSDEEP
3072:78FSo5DOhBoNK7ak4F+ACFrVJjXe6zKB6JukoZ+L5O0IOCM:JuABoNuc+5JjXe160ko4L5OPtM
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e0bd2e82197201cb58a79089795c5c194f36509f83b4625241f8626b36a1e51d.exe windows x86
626c2f416efb1cc0b0ccd74c31380c3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
CopySid
GetLengthSid
IsValidSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
AddAce
GetAce
GetAclInformation
AddAccessAllowedAce
InitializeAcl
RegEnumKeyExW
SetSecurityDescriptorDacl
OpenProcessToken
OpenThreadToken
ConvertStringSidToSidW
FreeSid
OpenSCManagerW
OpenServiceW
QueryServiceStatus
StartServiceW
CloseServiceHandle
AllocateAndInitializeSid
kernel32
GetModuleHandleW
lstrcmpiW
CloseHandle
WaitForSingleObject
GetModuleFileNameW
GetCurrentProcess
GetCurrentThread
Sleep
LocalFree
GetCurrentThreadId
CreateThread
CreateEventW
InterlockedIncrement
InterlockedDecrement
GetProcAddress
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetCommandLineW
GetProcessHeap
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
HeapFree
HeapAlloc
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
GetVersionExA
lstrlenW
SetEvent
user32
CharUpperW
DispatchMessageW
TranslateMessage
GetMessageW
CharNextW
UnregisterClassA
PostThreadMessageW
msvcrt
_unlock
_errno
_lock
_onexit
?terminate@@YAXXZ
_controlfp
__dllonexit
realloc
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_wcmdln
_initterm
_XcptFilter
_exit
_cexit
__wgetmainargs
wcsncat_s
_purecall
memset
??_U@YAPAXI@Z
??2@YAPAXI@Z
wcscat_s
wcsncpy_s
wcscpy_s
memcpy_s
free
malloc
??_V@YAXPAX@Z
??3@YAXPAX@Z
exit
userenv
ExpandEnvironmentStringsForUserW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoInitializeSecurity
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitialize
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
oleaut32
VariantInit
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringByteLen
SysFreeString
VariantClear
VarUI4FromStr
shell32
ShellExecuteExW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
rpcrt4
RpcBindingFromStringBindingW
RpcBindingSetAuthInfoExW
RpcStringFreeW
NdrClientCall2
RpcStringBindingComposeW
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE