Behavioral task
behavioral1
Sample
7a424542b23c4106898a49dfa87aee4530191687d3bd034a7efc89f30edb3447.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a424542b23c4106898a49dfa87aee4530191687d3bd034a7efc89f30edb3447.exe
Resource
win10v2004-20220812-en
General
-
Target
7a424542b23c4106898a49dfa87aee4530191687d3bd034a7efc89f30edb3447
-
Size
212KB
-
MD5
6b40e91128c45888967e66401d689b10
-
SHA1
a874c32789244890903bb076dba0800e30107747
-
SHA256
7a424542b23c4106898a49dfa87aee4530191687d3bd034a7efc89f30edb3447
-
SHA512
f360cbb839f89b4b64cb8459e0b3326b9435ff6357d2fcc987bb748a8a75303ac4faabc194715a224d237bdd1dbeb9c25c8b09eb450589028098e8fcb2aeed15
-
SSDEEP
3072:9eG+4bTbgYnI5o1LB3Ico2VtUK8Zk1lDfBYg4B21IDr8WZvjs4KdOLpVeIa626Z/:9t+MbgYZVQG22shrsNWnR1E6JQnaP
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7a424542b23c4106898a49dfa87aee4530191687d3bd034a7efc89f30edb3447.exe windows x86
e0bb66e68ea044355b10724ea0433a13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
OpenProcess
WaitForSingleObject
CreateProcessA
ReadProcessMemory
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
Sleep
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
CloseHandle
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
GetTimeZoneInformation
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 148KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE