Behavioral task
behavioral1
Sample
a8a614f9a97431521cfcc1efd9d56b6de6dd8a71397d95b937299abdfdf795c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8a614f9a97431521cfcc1efd9d56b6de6dd8a71397d95b937299abdfdf795c1.exe
Resource
win10v2004-20220901-en
General
-
Target
a8a614f9a97431521cfcc1efd9d56b6de6dd8a71397d95b937299abdfdf795c1
-
Size
224KB
-
MD5
7ba67916420436a5cdeec0d109842a8f
-
SHA1
007cfe6fc61eb02fcbdeeaee4df81d25343f3055
-
SHA256
a8a614f9a97431521cfcc1efd9d56b6de6dd8a71397d95b937299abdfdf795c1
-
SHA512
61f94c2062a444b99e9c6cbd899b13fe3fd346219493f9f77227a7f6cbe14164f68d17fef719ebb68f36550572dc62860be130d17c132147d22030295bae94e2
-
SSDEEP
6144:PKuyBThJwQiP6CZsa6KDG16eT1oSj9mD:Suco9P6CZsN6eT1o09
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a8a614f9a97431521cfcc1efd9d56b6de6dd8a71397d95b937299abdfdf795c1.exe windows x86
ad8041f16583278165071a5220fae530
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
OpenFile
GetCurrentProcessId
GetVersionExA
OpenMutexA
_lclose
HeapSize
GetLocaleInfoA
GetWindowsDirectoryA
CopyFileA
GetCurrentThreadId
Sleep
ReleaseMutex
CloseHandle
CreateMutexA
GetTickCount
InitializeCriticalSection
GetLocalTime
GetLastError
GetComputerNameA
GetVolumeInformationA
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
GetModuleFileNameA
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetFilePointer
SetHandleCount
GetFileType
MultiByteToWideChar
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetMessageA
TranslateMessage
DispatchMessageA
RegisterClassA
PostQuitMessage
DefWindowProcA
CreateWindowExA
SetTimer
wsprintfA
KillTimer
advapi32
RegDeleteValueA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
DeleteService
CreateServiceA
RegCreateKeyA
DeregisterEventSource
RegisterEventSourceA
ReportEventA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
GetUserNameA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
LookupAccountSidA
RegCloseKey
RegDeleteKeyA
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE