Behavioral task
behavioral1
Sample
4a4bd2f88a602986be1bb248e9f602425d01403a9eb17fcbc6a98a031a161b17.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4a4bd2f88a602986be1bb248e9f602425d01403a9eb17fcbc6a98a031a161b17.exe
Resource
win10v2004-20220812-en
General
-
Target
4a4bd2f88a602986be1bb248e9f602425d01403a9eb17fcbc6a98a031a161b17
-
Size
181KB
-
MD5
3202dcaf4de6fcdd9d95e4c94dbdfc6c
-
SHA1
0c94133dc9e77b596a118c1490cd8f2771887ce5
-
SHA256
4a4bd2f88a602986be1bb248e9f602425d01403a9eb17fcbc6a98a031a161b17
-
SHA512
b3614cf28f1fa853584ac13f5a8c50ae770b26ab91590505a60a9d8886b51ad438364423041015969ee1eeec03cf40e24c64a9f0cb278771bb4330dd89c156d2
-
SSDEEP
3072:ke7teJkmOxL+gHCyzVvZ/uM54+rHUyTR3A75mYFCikhTTNus:htZmODHlB/uM54V8a75/3khT5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4a4bd2f88a602986be1bb248e9f602425d01403a9eb17fcbc6a98a031a161b17.exe windows x86
0eef0c5bc0977cf313fa3ea47359e554
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegEnumValueW
RegOpenKeyExW
RegSetValueW
RegDeleteKeyW
RegQueryValueW
kernel32
LoadLibraryW
lstrlenW
GetLastError
GetEnvironmentVariableW
GetVersion
GetModuleHandleW
SetErrorMode
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindClose
FindNextFileW
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
lstrcmpW
FindFirstFileExW
GetShortPathNameW
GetSystemDefaultUILanguage
CreateDirectoryW
LocalFree
LocalAlloc
GetProcAddress
CloseHandle
CreateFileW
GetTickCount
Sleep
SearchPathW
FindResourceW
GetUserDefaultUILanguage
UnmapViewOfFile
GetLocaleInfoW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
FindResourceExW
LoadResource
SetLastError
GetPrivateProfileStringW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
FreeLibrary
GetSystemDirectoryW
GetVersionExW
GetModuleFileNameW
user32
MessageBoxW
GetMenuItemInfoW
GetMenuItemCount
DestroyMenu
CreatePopupMenu
SendInput
GetCursorPos
SystemParametersInfoW
PostQuitMessage
SetWinEventHook
KillTimer
DispatchMessageW
GetMessageW
SetTimer
UnhookWinEvent
BlockInput
LoadStringW
msvcrt
bsearch
_wcsnicmp
_wcsicmp
wcsncmp
_controlfp
?terminate@@YAXXZ
memcpy
__set_app_type
__p__fmode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
_vsnwprintf
__p__commode
shell32
ord190
SHGetSpecialFolderPathW
SHBindToParent
SHParseDisplayName
SHGetDesktopFolder
ord165
ord155
SHChangeNotify
SHGetSpecialFolderLocation
SHSetLocalizedName
ord526
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
advpack
RunSetupCommandW
ExecuteCabW
RegRestoreAllW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
shlwapi
SHCopyKeyW
StrCmpNIW
PathAppendW
PathFileExistsW
PathCombineW
PathAddBackslashW
ord437
ord158
StrStrIW
SHGetValueW
StrCmpIW
SHSetValueW
SHDeleteValueW
PathRemoveBlanksW
PathAddExtensionW
SHRegGetValueW
PathRemoveExtensionW
ord433
ord225
SHDeleteKeyW
PathRemoveFileSpecW
iertutil
ord33
ord37
oleacc
AccessibleObjectFromEvent
oleaut32
SysFreeString
VariantClear
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 112KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE