Behavioral task
behavioral1
Sample
aa72fbfefded7282b8d0c2aba2050473616f343c34d20e2dcaad5a8c40e02dd5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa72fbfefded7282b8d0c2aba2050473616f343c34d20e2dcaad5a8c40e02dd5.exe
Resource
win10v2004-20220901-en
General
-
Target
aa72fbfefded7282b8d0c2aba2050473616f343c34d20e2dcaad5a8c40e02dd5
-
Size
158KB
-
MD5
66251afa659822aea83f152a326d8c94
-
SHA1
305c452392727a66d14a470a5e2aaa7b31d7a3ae
-
SHA256
aa72fbfefded7282b8d0c2aba2050473616f343c34d20e2dcaad5a8c40e02dd5
-
SHA512
73a488d1662dd9c3c2b06120d7906745547f68a43dd27dc46ee16ccc4be8806229335a5f80b344861fb0a62f8e2110c893047011fc1159d55fa13aa31bc6b794
-
SSDEEP
3072:oFaOJf8HQCBOGqD5EoCH7akcrwOsAIDHdA6Uty/2n9hOLzet980:ogOJkHBBi1fCHvjAyiTm6t9t
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
aa72fbfefded7282b8d0c2aba2050473616f343c34d20e2dcaad5a8c40e02dd5.exe windows x86
cdc3f249b56fcbb8a391c9442d9eaaf6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
CreateWellKnownSid
CheckTokenMembership
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
kernel32
GetStdHandle
GetCurrentProcess
InterlockedDecrement
GetTempPathW
GetVersionExW
LocalFree
GetLastError
GetFileAttributesW
lstrlenW
InterlockedIncrement
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
LocalAlloc
FormatMessageW
GetModuleHandleW
GetDateFormatW
GetTimeFormatW
SystemTimeToTzSpecificLocalTime
GetSystemTime
CloseHandle
WriteFile
SetFilePointer
CreateFileW
WriteConsoleW
msvcrt
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_purecall
wcschr
_vsnwprintf
__CxxFrameHandler
wprintf
_wcsicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
wcsstr
memset
ole32
CoTaskMemAlloc
CoInitializeSecurity
CoUninitialize
CoCreateGuid
StringFromIID
CoCreateInstance
CoTaskMemFree
CoInitialize
user32
LoadStringW
winspool.drv
ord209
DeletePrinterConnectionW
ord207
AddPrinterConnectionW
ord204
oleaut32
VariantInit
VariantClear
SysAllocString
SysFreeString
SysStringLen
userenv
FreeGPOListW
GetGPOListW
comctl32
ord320
ord327
ord324
ord323
ord321
wldap32
ord27
ord41
ord13
ord145
ord73
ord208
ord26
ord88
ord140
netapi32
DsGetDcNameW
activeds
ord3
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE