Behavioral task
behavioral1
Sample
1625b9a550af668dac96a16466c5391fc3f953f5d45cdd2485fa3a78f6cb792c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1625b9a550af668dac96a16466c5391fc3f953f5d45cdd2485fa3a78f6cb792c.exe
Resource
win10v2004-20220812-en
General
-
Target
1625b9a550af668dac96a16466c5391fc3f953f5d45cdd2485fa3a78f6cb792c
-
Size
125KB
-
MD5
3dea6f66c16265e886456a541fe0e753
-
SHA1
3eefbc96312b4ae4cc0029e392e8d85abdf0127b
-
SHA256
1625b9a550af668dac96a16466c5391fc3f953f5d45cdd2485fa3a78f6cb792c
-
SHA512
92f0b16ff9e332c6534b9ecf8f0decaea4bd65b584a9326ef35619d725207eb49de14a192669633e4be8d9dd15bcc5dbb35bcc892135a188055065e315309a2a
-
SSDEEP
3072:oVfOck5Ij+hh47YkAmDvwHcqMAAjDM547IAD88J4oD:eOc6h47ZE8gAjy4cAY8aA
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1625b9a550af668dac96a16466c5391fc3f953f5d45cdd2485fa3a78f6cb792c.exe windows x86
47d88366052bd4c13cd343e5fd28a92d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wrg760n
ord1
ord20
msvcr80
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
__getmainargs
_amsg_exit
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
__argv
__argc
__CxxFrameHandler3
??3@YAXPAX@Z
sprintf
strcpy
_setmbcp
_controlfp_s
_invoke_watson
?terminate@@YAXXZ
_cexit
_decode_pointer
mfc80
ord701
ord757
ord1084
ord1091
ord1206
ord1208
kernel32
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE