Behavioral task
behavioral1
Sample
1712efe31994924652a3ea2f00a7b80867f62c0c7298437f7864b7d2359b455d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1712efe31994924652a3ea2f00a7b80867f62c0c7298437f7864b7d2359b455d.exe
Resource
win10v2004-20220812-en
General
-
Target
1712efe31994924652a3ea2f00a7b80867f62c0c7298437f7864b7d2359b455d
-
Size
218KB
-
MD5
79cc511c67bb3563dafba29d795c87dd
-
SHA1
b97cda7635cf6c0d68df3dd662728250da71720a
-
SHA256
1712efe31994924652a3ea2f00a7b80867f62c0c7298437f7864b7d2359b455d
-
SHA512
6edf22dc877fef061ada061e58c6c9ca34d7ba6c827b9c04eeda97d3c001d0e25252685e3e1a32fec2b2eee743bd5f4fa493a99683d1d566fa8af7782d2f46b5
-
SSDEEP
3072:pXd/koSrg7mEqsi/MMqXSNPAfPDzyckZMBbgpKPWPfw5OVQqVelzOxB5Xr3YAHZ5:H/1SrAJ9iOCNPADjE4WPNd4lCp1HZ5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1712efe31994924652a3ea2f00a7b80867f62c0c7298437f7864b7d2359b455d.exe windows x86
5abc1dbfd096be4a7a73f981e4bd6402
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__iob_func
__CxxFrameHandler3
??3@YAXPAX@Z
??2@YAPAXI@Z
fflush
_controlfp
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_wcmdln
_XcptFilter
_exit
_cexit
__wgetmainargs
_snwprintf_s
wcsncmp
memmove
memcpy
malloc
free
wprintf
fputws
_purecall
??_U@YAPAXI@Z
??_V@YAXPAX@Z
_putws
_wtoi
_wfopen
fclose
puts
memset
_ftol2_sse
_wcsicmp
__argc
_wsetlocale
__wargv
exit
_wcsdup
_vsnwprintf
ntdll
NtQuerySystemInformation
NtSetSystemInformation
RtlUnicodeStringToInteger
RtlInitUnicodeString
user32
PostMessageW
SendMessageW
EnableWindow
GetSysColor
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
PeekMessageW
RedrawWindow
LoadStringW
CharToOemW
OffsetRect
GetClientRect
SetTimer
GetSystemMetrics
LoadIconW
ScreenToClient
GetWindowRect
IsIconic
GetSystemMenu
AppendMenuW
DrawIcon
GetSysColorBrush
shell32
ShellAboutW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
comdlg32
CommDlgExtendedError
wintrust
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
WinVerifyTrust
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminAcquireContext
crypt32
CertFreeCertificateContext
imagehlp
ImageUnload
ImageLoad
ImageDirectoryEntryToDataEx
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiSetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
advapi32
RegOpenKeyExW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
kernel32
DeviceIoControl
FindVolumeClose
GetVolumePathNamesForVolumeNameW
LocalAlloc
LocalFree
SetCurrentDirectoryW
WaitForSingleObject
GetLocalTime
GetDateFormatW
GetTimeFormatW
GetLastError
CreateFileW
lstrcmpiA
MultiByteToWideChar
GetModuleHandleW
InterlockedExchange
GetCurrentDirectoryW
GlobalMemoryStatusEx
ResetEvent
FindNextVolumeW
CreateEventW
SetEvent
CloseHandle
ExpandEnvironmentStringsW
Sleep
HeapSetInformation
GetConsoleOutputCP
SetThreadPreferredUILanguages
FreeConsole
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
CreateThread
FindFirstVolumeW
GetSystemDirectoryW
UnhandledExceptionFilter
mfc42u
ord500
ord5602
ord5856
ord4253
ord5156
ord489
ord768
ord1899
ord1761
ord324
ord4229
ord4370
ord4847
ord5276
ord3592
ord4270
ord3693
ord765
ord1196
ord6879
ord6667
ord6211
ord772
ord1172
ord355
ord2507
ord3447
ord5679
ord1560
ord922
ord5706
ord2877
ord3281
ord2371
ord3658
ord641
ord537
ord268
ord2293
ord2350
ord6330
ord2634
ord541
ord341
ord654
ord801
ord941
ord940
ord535
ord2606
ord860
ord5855
ord5977
ord1197
ord6655
ord4197
ord538
ord942
ord4124
ord2755
ord713
ord414
ord3657
ord5817
ord6137
ord924
ord859
ord656
ord3577
ord4392
ord2570
ord4213
ord2015
ord2403
ord616
ord3312
ord4254
ord1165
ord2858
ord4294
ord3133
ord1143
ord771
ord1008
ord496
ord3695
ord4425
ord2046
ord4433
ord5284
ord2520
ord1683
ord3087
ord4709
ord5050
ord755
ord470
ord3605
ord2362
ord2289
ord2357
ord1569
ord2078
ord5296
ord4667
ord4269
ord815
ord3733
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord5303
ord4692
ord4074
ord2717
ord5298
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord800
ord540
ord561
ord1131
ord795
ord609
ord693
ord4419
ord4621
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4829
ord3793
ord5283
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4992
ord4848
ord4371
ord5261
ord4352
ord4942
ord4736
ord4155
ord858
ord5155
ord818
ord567
ord3716
ord3397
ord4831
ord5286
ord1768
ord6051
ord3569
ord4390
ord2567
ord3635
ord3365
ord4396
ord2574
ord2294
ord5568
ord2910
ord4704
ord4970
ord6896
ord6195
ord6136
ord5854
ord6139
ord6928
ord5857
ord6874
ord6278
ord6279
ord861
ord536
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE