Behavioral task
behavioral1
Sample
993bacf60f04eec7c8a4cf6ca1bc34093c4952dacbb51069c50de59535f4a0ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
993bacf60f04eec7c8a4cf6ca1bc34093c4952dacbb51069c50de59535f4a0ee.exe
Resource
win10v2004-20220812-en
General
-
Target
993bacf60f04eec7c8a4cf6ca1bc34093c4952dacbb51069c50de59535f4a0ee
-
Size
176KB
-
MD5
38a9d6cf168050fe3d76a8b07cb6c63b
-
SHA1
8753286a15cc942bbe750e7d3783c77b3137a04e
-
SHA256
993bacf60f04eec7c8a4cf6ca1bc34093c4952dacbb51069c50de59535f4a0ee
-
SHA512
dcac7d982954ba7d53c96820e2f9a4d0939d0a4b06464c2c55c8abc2409d0bfbbcfca19b5bd5d221b3fb4014a6ce2e7a81c95389fb8606fdd1228164604d3e72
-
SSDEEP
3072:xeAN336MdMfLirkQW0/nyypEbtt+oBGPPdwvg7qGegpSyn3jc5PonWwozOR3KU+2:xnqqULirkT01EjjBGP1wvSq5sSy3YPox
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
993bacf60f04eec7c8a4cf6ca1bc34093c4952dacbb51069c50de59535f4a0ee.exe windows x86
6e1b142405a4e744b97f4e6cc0a9aa73
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
FreeLibrary
SetErrorMode
GetProcAddress
HeapFree
SetCurrentDirectoryA
CloseHandle
CreateMutexA
GetStartupInfoA
GetCommandLineW
MultiByteToWideChar
HeapAlloc
lstrlenA
GetVersion
GetProcessHeap
SetThreadPriority
ExitProcess
LocalFree
LoadLibraryA
FormatMessageA
GetCommandLineA
GetModuleHandleA
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CompareStringA
lstrlenW
GetCurrentThread
GetLastError
DelayLoadFailureHook
user32
FindWindowA
ShowWindow
IsIconic
SetForegroundWindow
GetClassNameA
GetParent
GetDesktopWindow
GetWindowThreadProcessId
IsWindowVisible
GetWindow
MessageBoxA
SendMessageTimeoutA
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE