Behavioral task
behavioral1
Sample
3642f4bc9914d95772ebc86aee62aef43d76fcc78b7419e16e45daac881b5119.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3642f4bc9914d95772ebc86aee62aef43d76fcc78b7419e16e45daac881b5119.exe
Resource
win10v2004-20220812-en
General
-
Target
3642f4bc9914d95772ebc86aee62aef43d76fcc78b7419e16e45daac881b5119
-
Size
141KB
-
MD5
576502871202dfcc837eff0f9ecb290b
-
SHA1
0670d4dddec78c215713c4e205a68b7a9a1c83f3
-
SHA256
3642f4bc9914d95772ebc86aee62aef43d76fcc78b7419e16e45daac881b5119
-
SHA512
2825f409ed47b5bbe6b092bf79c4cbf765055c2d8cbfd595966d0a2be35ece27533c6cf9e6d8a9072c0e52da8429c46f45d9688a45cf2b19977598013aa7471b
-
SSDEEP
3072:7X3nSqnS99+Aev7gcD2WM4aPR9apW2EYhKa9qIrAId2Jv:RSjMzna5mEkK8qSAIAp
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3642f4bc9914d95772ebc86aee62aef43d76fcc78b7419e16e45daac881b5119.exe windows x86
54e9ec85a1d8c21ec1d4ee8a6f496366
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
DeregisterEventSource
ReportEventW
RegisterEventSourceW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumKeyW
RegDeleteKeyW
IsTextUnicode
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
kernel32
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetLastError
HeapReAlloc
CreateFileW
GetFileSize
ReadFile
MultiByteToWideChar
CloseHandle
GetLastError
LocalAlloc
CreateMutexW
WaitForSingleObject
LocalFree
GetModuleHandleW
FormatMessageW
GetStdHandle
GetFileType
WriteConsoleW
WideCharToMultiByte
WriteFile
HeapFree
GetProcessHeap
HeapAlloc
UnhandledExceptionFilter
GetCurrentProcess
HeapSetInformation
SetThreadPreferredUILanguages
lstrlenW
SetThreadUILanguage
GetCommandLineW
lstrcmpiW
Sleep
InterlockedExchange
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
TerminateProcess
msvcrt
_vsnwprintf
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_wcsnicmp
_wtof
memcpy
_wcsicmp
floor
setlocale
memset
loadperf
UnloadPerfCounterTextStringsW
LpAcquireInstallationMutex
LpReleaseInstallationMutex
user32
LoadStringW
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE