Behavioral task
behavioral1
Sample
769a5f2ea082cac9fc00aa413265529cfa4ee3b85c0948da79d9cf97f9f37ae5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
769a5f2ea082cac9fc00aa413265529cfa4ee3b85c0948da79d9cf97f9f37ae5.exe
Resource
win10v2004-20220812-en
General
-
Target
769a5f2ea082cac9fc00aa413265529cfa4ee3b85c0948da79d9cf97f9f37ae5
-
Size
156KB
-
MD5
3eb86bb75b9146426f60288857405c02
-
SHA1
de765df174f3b650fe75675f9de17c7f90f4628a
-
SHA256
769a5f2ea082cac9fc00aa413265529cfa4ee3b85c0948da79d9cf97f9f37ae5
-
SHA512
97bc877ba69aa3ac0319dd56b814fda473e5ce62526805be0573ae3edfb94bfb9d1aeb658447d2abcccf8504460d82f933b1308d4cb1d7a47be396e0a0f7df03
-
SSDEEP
3072:Xqd8H0fsLudEBwO1sP7WEczewLPAMMiOiE7eDqu2sVRlCk:66ipP7W57AMMrx7Lgd
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
769a5f2ea082cac9fc00aa413265529cfa4ee3b85c0948da79d9cf97f9f37ae5.exe windows x86
0db8083ee7a7fd1c875e9333c044b6d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RevertToSelf
CreateProcessAsUserW
ImpersonateLoggedOnUser
OpenProcessToken
kernel32
OpenProcess
HeapFree
GetProcessHeap
LoadLibraryW
lstrlenW
GetLastError
GetProfileStringW
GetCurrentThreadId
CreateThread
LoadLibraryExA
SetEvent
OpenEventW
GetCurrentProcessId
GetModuleHandleA
lstrlenA
WaitForSingleObject
lstrcmpiW
LocalFree
LocalAlloc
Sleep
GetNumberFormatW
SetProcessWorkingSetSize
CreateEventW
MapViewOfFile
lstrcmpW
UnmapViewOfFile
WideCharToMultiByte
InterlockedIncrement
LoadLibraryA
InterlockedDecrement
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetExitCodeProcess
CloseHandle
GetTickCount
GetProcAddress
FreeLibrary
LoadLibraryExW
GetLocaleInfoW
OpenFileMappingW
gdi32
DeleteObject
user32
SetWindowLongW
CreateDialogParamW
PostQuitMessage
DefWindowProcW
CreateWindowExW
RegisterClassExW
GetUserObjectInformationW
GetThreadDesktop
GetProcessWindowStation
SendDlgItemMessageW
SetDlgItemTextW
RegisterWindowMessageW
GetDlgItem
SetWindowTextW
DestroyMenu
InsertMenuW
GetMenuItemCount
GetSubMenu
LoadMenuW
SetForegroundWindow
GetLastActivePopup
EnableWindow
ShowWindow
TrackPopupMenu
SetMenuDefaultItem
DestroyWindow
PostMessageW
GetCursorPos
PostThreadMessageW
SetWindowPos
SystemParametersInfoA
GetWindowRect
SendMessageW
IsWindowVisible
IsWindow
DispatchMessageW
GetWindowLongW
TranslateMessage
IsDialogMessageW
GetMessageW
MsgWaitForMultipleObjects
PeekMessageW
GetDlgCtrlID
ChildWindowFromPointEx
ScreenToClient
EndDialog
msvcrt
_exit
_XcptFilter
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_cexit
__getmainargs
_vsnprintf
_vsnwprintf
memset
memcpy
cmutil
IsLogonAsSystem
CmAtolW
CmIsDigitW
ReleaseBold
MakeBold
UpdateFont
CmLoadStringW
CmWinHelp
??0CmLogFile@@QAE@XZ
??0CIniW@@QAE@PAUHINSTANCE__@@PBG111@Z
?GetPrimaryRegPath@CIniW@@QBEPBGXZ
CmStrCpyAllocW
?SetPrimaryRegPath@CIniW@@QAEXPBG@Z
?Init@CmLogFile@@QAEJPAUHINSTANCE__@@HPBG@Z
?SetParams@CmLogFile@@QAEJHKPBG@Z
?Start@CmLogFile@@QAEJH@Z
?Stop@CmLogFile@@QAEJXZ
CmParsePathW
?Log@CmLogFile@@QAAXW4_CMLOG_ITEM@@ZZ
CmFmtMsgW
GetOSVersion
GetOSMajorVersion
?GPPI@CIniW@@QBEKPBG0K@Z
?DeInit@CmLogFile@@QAEJXZ
??1CIniW@@QAE@XZ
??1CmLogFile@@QAE@XZ
CmLoadIconW
CmLoadSmallIconW
?GPPB@CIniW@@QBEHPBG0H@Z
?Clear@CIniW@@QAEXXZ
?SetHInst@CIniW@@QAEXPAUHINSTANCE__@@@Z
?SetFile@CIniW@@QAEXPBG@Z
?GPPS@CIniW@@QBEPAGPBG00@Z
?GetFile@CIniW@@QBEPBGXZ
CmBuildFullPathFromRelativeW
?SetPrimaryFile@CIniW@@QAEXPBG@Z
CmMalloc
CmFree
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE