Behavioral task
behavioral1
Sample
e6d9d35f2f60afdd6393c5e8723772b9393d549d9e2f4e0e7d89359025cca888.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e6d9d35f2f60afdd6393c5e8723772b9393d549d9e2f4e0e7d89359025cca888.exe
Resource
win10v2004-20220901-en
General
-
Target
e6d9d35f2f60afdd6393c5e8723772b9393d549d9e2f4e0e7d89359025cca888
-
Size
176KB
-
MD5
689db2220c85778ad2278d90addca4f9
-
SHA1
08359f90bcfe5e7fd5f972ef9681d6b24889aa2f
-
SHA256
e6d9d35f2f60afdd6393c5e8723772b9393d549d9e2f4e0e7d89359025cca888
-
SHA512
0ab60c4d270a72362e61336b2b1265dc99423952d6a63cf59367b9962a42231a66d20897e501b7784b5d4cf9b7a8542a6449fe13a5be0e377cbcde6478366292
-
SSDEEP
3072:DdwuEoDKAMhY4a/ogkTDKfyH25dTgpROSPj6OzDB49Q/3tTDOHwKl:DdJNcYKgki6my+azV40tTD+x
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e6d9d35f2f60afdd6393c5e8723772b9393d549d9e2f4e0e7d89359025cca888.exe windows x86
bcd6713d96df4f3718e8d8980dd69bc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
GetLastError
GetCurrentDirectoryA
FreeEnvironmentStringsA
GetFileType
HeapDestroy
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapAlloc
GetCPInfo
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
LCMapStringA
LCMapStringW
SetFilePointer
HeapReAlloc
GetACP
GetOEMCP
VirtualAlloc
SetStdHandle
GetProcAddress
LoadLibraryA
FlushFileBuffers
user32
MessageBoxA
advapi32
ControlService
StartServiceA
OpenSCManagerA
CloseServiceHandle
DeleteService
OpenServiceA
CreateServiceA
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE