Behavioral task
behavioral1
Sample
8403a0e043e44dbf3a49845f3a08c441e9742e6811141eee75e69037c1260a54.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8403a0e043e44dbf3a49845f3a08c441e9742e6811141eee75e69037c1260a54.exe
Resource
win10v2004-20220812-en
General
-
Target
8403a0e043e44dbf3a49845f3a08c441e9742e6811141eee75e69037c1260a54
-
Size
5.3MB
-
MD5
6fe93521786ee8b46d67e687b366ae8b
-
SHA1
3b9bf0ce128abad325b11ab7a19fe320d3fdb03f
-
SHA256
8403a0e043e44dbf3a49845f3a08c441e9742e6811141eee75e69037c1260a54
-
SHA512
b732e7222f90cf909d3e5371da79a895206d2a300578f54339fe35840cd5de91c30b081431672ed57d484c7faccd030bd7d9b107c1af4eda1535fdfd92585df6
-
SSDEEP
49152:heJBz0V8lz04KRzrXZLz04KRzrrLMzrXZLz0MAMz0QdmzrbHQzsk:he4Vj4qXu4qrIXuMWQgbZk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8403a0e043e44dbf3a49845f3a08c441e9742e6811141eee75e69037c1260a54.exe windows x86
48049ab42c306e3166e9402d609a2d9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
QueryPerformanceCounter
GetLastError
CreateDirectoryA
ReleaseMutex
CreateProcessA
CreateMutexA
GetProcessAffinityMask
OpenMutexA
GetCurrentProcess
GetCommandLineA
GetEnvironmentStrings
GetEnvironmentStringsW
FlushFileBuffers
CloseHandle
LCMapStringW
LCMapStringA
SetStdHandle
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetOEMCP
GetACP
LoadLibraryA
GetCPInfo
RtlUnwind
GetModuleHandleA
GetStartupInfoA
QueryPerformanceFrequency
GetVersion
ExitProcess
GetProcAddress
HeapAlloc
HeapFree
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
IsBadCodePtr
VirtualFree
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetFilePointer
SetUnhandledExceptionFilter
IsBadReadPtr
user32
GetClientRect
EndDialog
EndPaint
BeginPaint
LoadBitmapA
ReleaseDC
GetDC
SetWindowPos
GetDesktopWindow
GetDlgItem
SendMessageA
DialogBoxParamA
gdi32
SelectObject
GetStockObject
DeleteDC
Rectangle
CreateCompatibleDC
BitBlt
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteExA
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: 4KB - Virtual size: 20B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE