Behavioral task
behavioral1
Sample
f94ed428b78fec43894bbd2fced612c58715bb4faf335ebaa853871cbcc64a75.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f94ed428b78fec43894bbd2fced612c58715bb4faf335ebaa853871cbcc64a75.exe
Resource
win10v2004-20220812-en
General
-
Target
f94ed428b78fec43894bbd2fced612c58715bb4faf335ebaa853871cbcc64a75
-
Size
660KB
-
MD5
60ce987c783b64821e0246af92402a79
-
SHA1
4b90527daab6a94cbe83d8fb2494906932390054
-
SHA256
f94ed428b78fec43894bbd2fced612c58715bb4faf335ebaa853871cbcc64a75
-
SHA512
c37af7801163513d9ee61557794a351cbdcbcaad523e18685e467ea09dac9aee605131e665d1ed68d0af787d6a3acc7abbfb1a9b94261ff71d48f9cf8834017b
-
SSDEEP
12288:8Zk5144I+8yzh84buv6T6PZCrhq+p900eSDVKfkI9YUR+XIOO2qc5B6tttJN+5tn:79Cch88T6Ru9FeSBmkI9YA+XIcB6tde
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f94ed428b78fec43894bbd2fced612c58715bb4faf335ebaa853871cbcc64a75.exe windows x86
4e2dc29ce60a9d90478f8b3120776b86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetCurrentProcess
SetPriorityClass
GetTickCount
GetModuleFileNameA
GetLocalTime
CreateFileA
lstrcpynA
MultiByteToWideChar
lstrcatA
lstrcpyA
FormatMessageA
WideCharToMultiByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
GetWindowsDirectoryA
GetCurrentThreadId
WriteFile
SetFilePointer
GetFileSize
GetCurrentProcessId
WaitForSingleObject
SetEvent
ResetEvent
CreateEventA
OpenEventA
SetThreadPriority
SetLastError
GetVersionExA
GetExitCodeProcess
CreateProcessA
ReleaseMutex
CreateMutexA
InterlockedDecrement
InterlockedIncrement
TerminateThread
RaiseException
RtlUnwind
ExitProcess
GetStartupInfoA
ExitThread
TlsSetValue
TlsGetValue
CreateThread
HeapAlloc
GetCPInfo
HeapFree
HeapReAlloc
LCMapStringA
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringA
CompareStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
TlsFree
TlsAlloc
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
FlushFileBuffers
GetACP
GetOEMCP
IsBadWritePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
GetTimeZoneInformation
SetStdHandle
ReadFile
GetLocaleInfoW
SetEndOfFile
SetEnvironmentVariableA
CloseHandle
GetSystemDirectoryA
GetComputerNameA
Sleep
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetLastError
GetLocaleInfoA
FreeLibrary
user32
FindWindowA
SendMessageA
winspool.drv
DeleteMonitorA
advapi32
RegDeleteKeyA
RegDeleteValueA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
RegEnumValueA
FreeSid
AllocateAndInitializeSid
GetAce
SetKernelObjectSecurity
GetSecurityDescriptorDacl
SetSecurityInfo
InitializeAcl
AddAccessAllowedAce
ControlService
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
IsValidSid
GetLengthSid
ole32
CoReleaseServerProcess
CoAddRefServerProcess
Sections
.text Size: 384KB - Virtual size: 381KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE