Behavioral task
behavioral1
Sample
866e7f876827f2b070be087fcfb25b55e934f56b347afbb4289837ccc219ea81.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
866e7f876827f2b070be087fcfb25b55e934f56b347afbb4289837ccc219ea81.exe
Resource
win10v2004-20220901-en
General
-
Target
866e7f876827f2b070be087fcfb25b55e934f56b347afbb4289837ccc219ea81
-
Size
792KB
-
MD5
787fcaaf5356886db528b6592c3dd176
-
SHA1
2714b847493da7fb7348164ee8a032acdc6190b0
-
SHA256
866e7f876827f2b070be087fcfb25b55e934f56b347afbb4289837ccc219ea81
-
SHA512
a60cb844c78e614909897d138b6c02f5bb643b915a607ee664a12a30740797b8a1abae9c185618aae440b16f3c1d479f22c7c31124acca16a5efe66cf040f0cd
-
SSDEEP
12288:As54qE+4Db2NLaULaULaULaULa+A93CXy2iE8:Aa4qmDb21aEaEaEaEa++3CC2i
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
866e7f876827f2b070be087fcfb25b55e934f56b347afbb4289837ccc219ea81.exe windows x86
f9456833c86cf259b7c82256985e1e45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableScrollBar
BeginPaint
EndPaint
SetWindowPos
SetScrollInfo
DestroyMenu
PostQuitMessage
GetMenu
ModifyMenuA
EnableMenuItem
MessageBoxA
DefWindowProcA
CreateWindowExA
SetClassLongA
GetMessageA
TranslateMessage
DispatchMessageA
CreateMenu
SetMenu
RegisterClassA
wsprintfA
LoadBitmapA
LoadCursorA
SetCursor
OpenDesktopA
CloseDesktop
EnableWindow
WaitForInputIdle
UpdateWindow
LoadImageA
DeleteMenu
InsertMenuA
AppendMenuA
DrawMenuBar
GetWindowThreadProcessId
DestroyWindow
FindWindowExA
GetMenuItemCount
SystemParametersInfoA
GetCursorPos
SetForegroundWindow
ShowWindow
GetWindowLongA
KillTimer
InvalidateRect
GetSysColor
IsIconic
GetSystemMetrics
DrawIcon
GetClientRect
GetWindowRect
GetDC
ReleaseDC
SendMessageA
CreatePopupMenu
SetWindowLongA
SetTimer
LoadIconA
RegisterWindowMessageA
FindWindowA
PostMessageA
winmm
PlaySoundA
mfc42
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord800
ord815
ord860
ord540
ord561
ord825
ord4220
ord2584
ord3654
ord3663
ord3626
ord641
ord795
ord2414
ord2438
ord812
ord2514
ord537
ord535
ord1168
ord858
ord6663
ord6117
ord2621
ord2725
ord6883
ord6403
ord6402
ord5440
ord6383
ord823
ord5450
ord6394
ord6453
ord5265
ord4376
ord4853
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord2370
ord4234
ord6055
ord1776
ord5290
ord3402
ord3830
ord3619
ord1146
ord559
ord567
ord2302
ord6334
ord1641
ord3521
ord6241
ord1644
ord6215
ord3092
ord2645
ord4710
ord4299
ord6880
ord2379
ord755
ord470
ord3693
ord4133
ord4297
ord5788
ord5862
ord6197
ord6378
ord6380
ord6144
ord5610
ord2614
ord541
ord801
ord922
ord924
ord2818
ord3522
ord4160
ord6270
ord2455
ord2528
ord616
ord692
ord6143
ord939
ord926
ord6377
ord941
ord5710
ord4204
ord5608
ord5572
ord2915
ord3337
ord1576
ord3811
ord5683
ord6283
ord6282
ord4129
ord4275
ord3571
ord2452
ord640
ord2405
ord5785
ord1640
ord323
ord4202
ord2764
ord668
ord1980
ord798
ord1997
ord859
ord5465
ord5194
ord533
ord2770
ord356
ord6662
ord1907
ord2575
ord4396
ord3574
ord5161
ord5162
ord5160
ord4905
ord4742
ord4976
ord4948
ord4358
ord4377
ord4854
ord5287
ord4835
ord609
ord768
ord489
ord4258
ord3019
ord2516
ord361
ord3719
ord793
ord2297
ord2363
ord2301
ord1908
ord1690
ord5288
ord4439
ord2054
ord4431
ord771
ord1008
ord497
ord4259
ord4715
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord4644
ord1771
ord6366
ord2413
ord2024
ord4217
ord2576
ord4397
ord3352
ord3577
ord2615
ord5890
ord5896
ord2937
ord6407
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord3721
ord2820
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
strncpy
_except_handler3
_mbsicmp
memmove
atoi
_ftol
_mbscmp
__CxxFrameHandler
_setmbcp
kernel32
GlobalAddAtomA
GetStartupInfoA
GetModuleHandleA
MultiByteToWideChar
GlobalAlloc
CreateSemaphoreA
ReleaseSemaphore
GlobalFree
GlobalLock
GlobalUnlock
CreateThread
CreateFileMappingA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
GetCurrentThread
GetCurrentProcess
LocalAlloc
LocalFree
GetCommandLineA
CreateMutexA
GetLastError
GlobalFindAtomA
LoadLibraryA
GlobalGetAtomNameA
GetSystemDefaultLangID
GetModuleFileNameA
GlobalDeleteAtom
lstrcpyA
Sleep
GetPrivateProfileIntA
GetExitCodeProcess
CloseHandle
CreateProcessA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetVersionExA
GetProcAddress
lstrlenA
OutputDebugStringA
WaitForSingleObject
ReleaseMutex
lstrcatA
lstrcpynA
GetLocaleInfoA
FreeLibrary
gdi32
CreateFontIndirectA
GetTextExtentPoint32A
TextOutA
PatBlt
SetBkMode
SetTextColor
SelectObject
MoveToEx
LineTo
GetTextMetricsA
GetStockObject
CreateCompatibleDC
BitBlt
GetObjectA
CreatePen
DeleteObject
GetDeviceCaps
comdlg32
GetSaveFileNameA
winspool.drv
EnumPrinterDriversA
EnumPrintersA
advapi32
RegDeleteKeyA
RegDeleteValueA
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegSetValueExA
RegEnumValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
Shell_NotifyIconA
ShellExecuteA
SHGetPathFromIDListA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 456KB - Virtual size: 454KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE