Behavioral task
behavioral1
Sample
5158ef0148f73bda8e186431e154944139d0e05b164c888eb5515b2df41aa095.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5158ef0148f73bda8e186431e154944139d0e05b164c888eb5515b2df41aa095.exe
Resource
win10v2004-20220812-en
General
-
Target
5158ef0148f73bda8e186431e154944139d0e05b164c888eb5515b2df41aa095
-
Size
768KB
-
MD5
64651e823284ce9f9bdcd2734d8414a0
-
SHA1
0c925b21b3c2d52f2d95c6d86b1989226175e953
-
SHA256
5158ef0148f73bda8e186431e154944139d0e05b164c888eb5515b2df41aa095
-
SHA512
7241012137252e6025247a661fc548c87447e219b47c249239c549ab773f12f96c6f91364a76f7f1c6d531221acc0a5dc7f404332be6eadd1fb2dbccc2eeed37
-
SSDEEP
12288:N6H+MLbPiXJ/Q6a2PjO26GNN5DDMkwaxJ4QFCam5wZBkyPz9bNHnc1JDs:bMLbPAQ6TGQFCam5wZB3pcj
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5158ef0148f73bda8e186431e154944139d0e05b164c888eb5515b2df41aa095.exe windows x86
a6b49ed6efa64d36743733113d9ed81a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
SetStdHandle
GetFileType
ExitProcess
ExitThread
CreateThread
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
RtlUnwind
GetStartupInfoW
HeapFree
GetTickCount
SetErrorMode
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
lstrlenA
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
GetModuleHandleA
CreateEventW
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetCurrentProcessId
GetFileTime
GetFileSize
GetFileAttributesW
CreateFileW
FindFirstFileW
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
WideCharToMultiByte
GlobalAlloc
MulDiv
lstrlenW
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
SetLastError
lstrcmpW
MultiByteToWideChar
GetModuleHandleW
GetVersionExA
Sleep
CloseHandle
GetCurrentProcess
GetCurrentThread
GetPrivateProfileIntW
WritePrivateProfileStringW
GetModuleFileNameW
FindResourceW
FormatMessageW
FreeLibrary
LoadResource
LockResource
GetProcAddress
SizeofResource
LoadLibraryW
LocalFree
GetProcessHeap
HeapAlloc
TerminateProcess
GetLastError
user32
PostThreadMessageW
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
ReleaseCapture
SetCapture
CharUpperW
LoadCursorW
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
DestroyMenu
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
ReleaseDC
GetDC
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SetCursor
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
MoveWindow
SetWindowTextW
IsDialogMessageW
GetDesktopWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
IsWindow
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
RegisterClipboardFormatW
GetMenuItemCount
MessageBoxW
ShowWindow
UnregisterClassW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
GetParent
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetWindowLongW
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetSystemMenu
PostMessageW
DrawIcon
LoadIconW
GetSystemMetrics
IsIconic
GetClientRect
AppendMenuW
SendMessageW
EnableWindow
GetActiveWindow
UnregisterClassA
gdi32
GetStockObject
GetBkColor
GetTextColor
GetRgnBox
GetWindowExtEx
GetMapMode
GetViewportExtEx
DeleteObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
CreateSolidBrush
SetMapMode
RestoreDC
SaveDC
ExtTextOutW
CreateRectRgnIndirect
GetDeviceCaps
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
FreeSid
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyW
GetUserNameW
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
LookupAccountNameW
shell32
ShellExecuteExW
SHGetFolderPathW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
oledlg
OleUIBusyW
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromProgID
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysFreeString
SysStringLen
VariantInit
VariantChangeType
SysAllocStringLen
VariantClear
netapi32
NetApiBufferFree
NetUserGetInfo
Sections
.text Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 412KB - Virtual size: 410KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE