Behavioral task
behavioral1
Sample
a3dfc2ad49bf03e0ed103609a0e5f4426d91bf9459cfd4c434c533099ced2b28.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a3dfc2ad49bf03e0ed103609a0e5f4426d91bf9459cfd4c434c533099ced2b28.exe
Resource
win10v2004-20220901-en
General
-
Target
a3dfc2ad49bf03e0ed103609a0e5f4426d91bf9459cfd4c434c533099ced2b28
-
Size
308KB
-
MD5
77cb6ccd7999b11cbcecc337796d591f
-
SHA1
3965916ef4fbf803fb68a2aea7754248e9ebe6e0
-
SHA256
a3dfc2ad49bf03e0ed103609a0e5f4426d91bf9459cfd4c434c533099ced2b28
-
SHA512
5221b6692079388032ded45bad6030edf63aaff7935cb8c7dfc550ae6e291f1654e84aab0cf90a5d4c832d2a5a9662619c7e85ea76cd1019505589bd1d25d58e
-
SSDEEP
6144:shR2C7lFnHPSrna7HxR/uNSavpRNgSzVzLs:WRbRJPSrna7H3gRNga
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a3dfc2ad49bf03e0ed103609a0e5f4426d91bf9459cfd4c434c533099ced2b28.exe windows x86
35e76dac65ae9e189711377a5dcfae26
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
BindImageEx
comctl32
InitCommonControlsEx
kernel32
WinExec
GetSystemDirectoryA
GetModuleFileNameA
GetPrivateProfileStringA
CompareStringW
CompareStringA
HeapSize
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
ReadFile
GetOEMCP
GetACP
CreateFileA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
FindClose
VirtualProtect
GetCPInfo
GetLocaleInfoA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetHandleCount
GetFileType
SetStdHandle
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
InterlockedExchange
ExitProcess
FlushFileBuffers
WriteFile
LCMapStringW
MultiByteToWideChar
GetDiskFreeSpaceA
FindResourceA
SizeofResource
GetFileAttributesA
LoadResource
LockResource
_lwrite
FreeResource
WritePrivateProfileStringA
GetLocalTime
FindFirstFileA
SetFileAttributesA
FindNextFileA
lstrlenA
OpenProcess
TerminateProcess
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
OpenFile
_llseek
_lread
_lclose
CreateDirectoryA
GetCurrentThread
GetLastError
GetCurrentProcess
LocalAlloc
LocalFree
CloseHandle
lstrcatA
GetVersionExA
lstrcpyA
SetEnvironmentVariableA
GetSystemInfo
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapFree
SetFilePointer
HeapAlloc
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
LCMapStringA
WideCharToMultiByte
user32
DialogBoxParamA
GetLastActivePopup
SetForegroundWindow
SendMessageTimeoutA
IsWindow
DestroyWindow
CreateDialogParamA
MessageBoxA
SetCursor
EnableWindow
FindWindowA
PeekMessageA
TranslateMessage
DispatchMessageA
SendMessageA
ShowWindow
IsWindowEnabled
SetFocus
SetTimer
GetSystemMenu
RemoveMenu
EndDialog
GetTopWindow
GetWindow
wsprintfA
GetDlgItem
SetWindowTextA
KillTimer
LoadBitmapA
LoadCursorA
RegisterClassA
DefWindowProcA
GetWindowLongA
SetWindowLongA
InvalidateRect
UpdateWindow
BeginPaint
GetClientRect
GetWindowTextA
GetSysColor
DrawTextA
EndPaint
LoadStringA
gdi32
ExcludeClipRect
CreateSolidBrush
Rectangle
GetObjectA
CreateCompatibleDC
GetPixel
CreateBitmap
CreateCompatibleBitmap
GetMapMode
SetMapMode
BitBlt
SetBkColor
DeleteObject
DeleteDC
CreatePen
SelectObject
LineTo
SetBkMode
SetTextColor
MoveToEx
advapi32
OpenThreadToken
AccessCheck
IsValidSecurityDescriptor
OpenProcessToken
DuplicateToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
FreeSid
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE