Behavioral task
behavioral1
Sample
cd0f5a92580de57be9f6446fdf017c9292900ad36245d8454c54dd62191c169e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd0f5a92580de57be9f6446fdf017c9292900ad36245d8454c54dd62191c169e.exe
Resource
win10v2004-20220901-en
General
-
Target
cd0f5a92580de57be9f6446fdf017c9292900ad36245d8454c54dd62191c169e
-
Size
152KB
-
MD5
7b26147b1a08e52a49dbf710aef28e84
-
SHA1
5b1a7e9441dc9f595c331eacbe0b3ed0a23c09f6
-
SHA256
cd0f5a92580de57be9f6446fdf017c9292900ad36245d8454c54dd62191c169e
-
SHA512
971cd1776f965c335ac85a0673a6c6697a81a7ccadd6db82a69670ef3c505f5081364b1cb8abdaf643fd8c838390de1647a8736de14de85974a4bff9c9f6b735
-
SSDEEP
3072:2yDeSSN1gF9ndEH6ioVm642+8p00m6QxcPWfY+8fLjTv9ejiA++:2yaSSN1gFUH6ioVm642+7v6QbD8fLjLU
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cd0f5a92580de57be9f6446fdf017c9292900ad36245d8454c54dd62191c169e.exe windows x86
6065885756bba943e8280c2e981263aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcscat
wcslen
??3@YAXPAX@Z
??2@YAPAXI@Z
wcsncmp
_c_exit
_exit
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
swscanf
advapi32
RegSetValueExW
RegFlushKey
RegDeleteKeyW
RegSetValueW
RegOpenKeyExA
SetFileSecurityW
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
GetAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegSetKeySecurity
RegEnumKeyW
RegQueryValueW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegEnumValueW
RegQueryInfoKeyW
kernel32
LoadLibraryExA
GetVersionExW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetShortPathNameW
GetSystemDefaultUILanguage
LoadLibraryExW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
lstrcmpA
MultiByteToWideChar
LocalFree
LocalAlloc
lstrcpyW
lstrcmpW
lstrcmpiW
GlobalFree
GetLastError
GlobalAlloc
SetFileAttributesW
GetFileAttributesW
lstrcpynW
lstrlenW
ExpandEnvironmentStringsW
CreateDirectoryW
GetModuleHandleW
GetSystemDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
ExitProcess
lstrcpynA
lstrcmpiA
user32
LoadStringW
wsprintfW
GetMenuItemInfoW
GetMenuItemCount
CreatePopupMenu
DestroyMenu
userenv
ord127
ord120
ord128
shlwapi
PathFindExtensionW
ord158
StrStrIW
SHDeleteKeyW
SHCopyKeyW
ord433
PathRemoveExtensionW
PathRemoveBlanksW
PathCombineW
wnsprintfW
StrCmpIW
StrToIntW
SHSetValueW
SHGetValueW
PathAddExtensionW
PathAppendW
ord437
StrCatBuffW
SHDeleteValueW
shell32
SHParseDisplayName
SHBindToParent
ord155
SHGetSpecialFolderLocation
SHChangeNotify
SHGetMalloc
SHSetLocalizedName
SHGetSpecialFolderPathW
SHGetFolderPathW
ole32
CoInitialize
OleUninitialize
OleInitialize
CoCreateInstance
CoUninitialize
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE