Behavioral task
behavioral1
Sample
14cc2f06d08e9e8a65398294f674ff02c9e011a12e4b7126989e0bf0e3b7f7bc.exe
Resource
win7-20220812-en
General
-
Target
14cc2f06d08e9e8a65398294f674ff02c9e011a12e4b7126989e0bf0e3b7f7bc
-
Size
156KB
-
MD5
60b19ee56a0c0669e77db3a4a979bd60
-
SHA1
dc9ede12c3c35c59d2ab08ffa8f7a9bba571413f
-
SHA256
14cc2f06d08e9e8a65398294f674ff02c9e011a12e4b7126989e0bf0e3b7f7bc
-
SHA512
a4042f43befc6597b5e75c892a3076ca103ab5555f460c1d28d2d5381d0604cdef3b278d8ab597cf135180035365be1a480b94c57c127e29f71b75743d70cfa1
-
SSDEEP
3072:JoGT5p1i7XHgoLraeUQqMHi88rz8YbRX4KiqDxeftb4aXdimWOZ:S25p1i7KTQqMFAwYdAW4pXdink
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
14cc2f06d08e9e8a65398294f674ff02c9e011a12e4b7126989e0bf0e3b7f7bc.exe windows x86
04e395eddebf9aaca2d8111a54474c40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexW
LocalFree
LocalHandle
LocalAlloc
lstrcmpW
CreateMutexW
lstrlenW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetCurrentProcess
SetFileAttributesW
GetFileAttributesW
WriteProfileStringW
RemoveDirectoryW
LoadLibraryA
CloseHandle
GlobalAlloc
CreateFileW
GetCPInfo
GetFileSize
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsA
GetModuleFileNameA
FreeEnvironmentStringsW
TerminateProcess
ExitProcess
UnhandledExceptionFilter
VirtualFree
HeapCreate
VirtualAlloc
GetProcAddress
GetVersion
HeapDestroy
GetStartupInfoA
GetModuleHandleA
GetCommandLineA
HeapFree
GetStringTypeW
HeapAlloc
GetStringTypeA
LCMapStringA
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
WriteFile
ReleaseMutex
GetACP
GetWindowsDirectoryW
DeleteFileW
MoveFileExW
GetSystemDirectoryW
MultiByteToWideChar
LCMapStringW
lstrcpyW
GlobalFree
GlobalLock
ReadFile
GlobalUnlock
GetLastError
lstrcatW
Sleep
user32
LoadStringW
GetMessageW
MessageBoxW
DispatchMessageW
FindWindowExW
ExitWindowsEx
DefWindowProcW
wsprintfW
SendMessageW
SetWindowPos
BeginPaint
GetSystemMetrics
GetClientRect
SetForegroundWindow
GetSysColor
PostQuitMessage
DrawTextW
EndPaint
LoadIconW
ShowWindow
UpdateWindow
CreateWindowExW
RegisterClassExW
GetFocus
TranslateMessage
gdi32
GetTextExtentPoint32W
SetTextColor
SetBkMode
winspool.drv
DeletePrinter
DeletePrinterConnectionW
OpenPrinterW
EnumJobsW
ClosePrinter
AbortPrinter
DeletePrinterDriverW
EnumPrintersW
advapi32
RegOpenKeyExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
CloseServiceHandle
RegQueryValueExW
RegDeleteKeyW
RegCloseKey
ControlService
DeleteService
OpenServiceW
QueryServiceStatus
OpenSCManagerW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ole32
CoTaskMemAlloc
CoTaskMemFree
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 935B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE