Behavioral task
behavioral1
Sample
12b01a67aecb0fa970fbf05e9851fd76e42a331d7d7e5d612860894452344029.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
12b01a67aecb0fa970fbf05e9851fd76e42a331d7d7e5d612860894452344029.exe
Resource
win10v2004-20220812-en
General
-
Target
12b01a67aecb0fa970fbf05e9851fd76e42a331d7d7e5d612860894452344029
-
Size
150KB
-
MD5
22a303a0877885fb46238ae92d0d70dc
-
SHA1
ff4115a4023801e0529a4995312c410a72839b32
-
SHA256
12b01a67aecb0fa970fbf05e9851fd76e42a331d7d7e5d612860894452344029
-
SHA512
9e65c651b1bd7ce656f950aa40d3ddd610a75451b09ac4a7b9bca348fac3a6630c4b2993dd9503ecc9780e7a40ce7dfbc953c33f420cfed06234897ba8b03ff5
-
SSDEEP
3072:vYa7nsrNbA5Ex83oX2XSXEJ4nu/oh36NRJVAJQNbUYpgLh0I:vroNE56X2XSUJIu/oh6NXKJqH2Lhf
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
12b01a67aecb0fa970fbf05e9851fd76e42a331d7d7e5d612860894452344029.exe windows x86
69554cd2a6527aebaadd24b6c769fd05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__set_app_type
_controlfp
_adjust_fdiv
_except_handler3
__setusermatherr
__p__fmode
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_write
_c_exit
_initterm
__p__commode
strchr
kernel32
LocalFree
FormatMessageA
GetModuleHandleA
lprhelp
GetShortQueue
CloseLPR
GetLongQueue
OpenLPR
user32
CharToOemBuffA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE