Behavioral task
behavioral1
Sample
8f0240633c2419aef100aa7e61b3fb8fbcef636c7b5078f6a66d5ae6816f45e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f0240633c2419aef100aa7e61b3fb8fbcef636c7b5078f6a66d5ae6816f45e3.exe
Resource
win10v2004-20220812-en
General
-
Target
8f0240633c2419aef100aa7e61b3fb8fbcef636c7b5078f6a66d5ae6816f45e3
-
Size
193KB
-
MD5
58ceee29279dcc1026c0c97af5f0c410
-
SHA1
be8ee9783e82305cfbe8a6ac3f02f7b2ab369c62
-
SHA256
8f0240633c2419aef100aa7e61b3fb8fbcef636c7b5078f6a66d5ae6816f45e3
-
SHA512
1e5a61dfe6b3d57d010ab174e5ab6b0768a9a5799aa7228cf712590949f591a1548471bde916a6d53375b5d5dfcc3b22756bcbd4573aeb9f9bc09866e8b98306
-
SSDEEP
3072:1jWzjZk8S0BzK105/wE46sXPwp4QvbY+sWiwtNhpHE6lvj8BoSGO04mi:1KJkUxdJ49X24QvbJsPwtjpHDVbSGOQ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8f0240633c2419aef100aa7e61b3fb8fbcef636c7b5078f6a66d5ae6816f45e3.exe windows x86
22d602c3d8e6f25ecb33fde5f8427bd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
AuditFree
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
LookupAccountNameW
ConvertStringSidToSidW
AuditLookupSubCategoryNameW
AuditEnumerateSubCategories
AuditLookupCategoryNameW
AuditEnumerateCategories
ConvertSecurityDescriptorToStringSecurityDescriptorW
AuditQuerySecurity
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
AuditSetSecurity
RegSetValueExW
LsaFreeMemory
LsaClose
LsaLookupSids
LsaNtStatusToWinError
LsaOpenPolicy
AuditEnumeratePerUserPolicy
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
AuditQueryGlobalSaclW
AuditSetGlobalSaclW
AuditQuerySystemPolicy
AuditQueryPerUserPolicy
AuditSetSystemPolicy
AuditSetPerUserPolicy
GetSecurityDescriptorSacl
EqualSid
DeleteAce
GetAce
GetAclInformation
LookupAccountSidW
kernel32
CompareStringW
GetConsoleOutputCP
SetThreadPreferredUILanguages
HeapSetInformation
LocalFree
CloseHandle
GetLastError
GetCurrentProcess
GetComputerNameW
FormatMessageW
LocalAlloc
CreateFileW
DeleteFileW
WriteFile
WideCharToMultiByte
WriteConsoleW
GetStdHandle
VirtualAlloc
VirtualProtect
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetVersion
msvcrt
ferror
feof
fgetws
_wfopen
wscanf
qsort
vfwprintf
_vsnwprintf_s
_wtoi
free
_callnewh
malloc
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_except_handler4_common
_controlfp
fclose
_purecall
memset
wcschr
??0exception@@QAE@XZ
__CxxFrameHandler3
wprintf
_CxxThrowException
memcpy
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
memmove_s
memcpy_s
_wcsnicmp
_wcsicmp
_wsetlocale
_iob
_vsnwprintf
??0exception@@QAE@ABQBD@Z
ntdll
RtlCompareMemory
RtlGUIDFromString
RtlNtStatusToDosError
RtlFreeHeap
RtlAllocateHeap
RtlImageNtHeader
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE