Behavioral task
behavioral1
Sample
6dcc35798428e7dbab212303a83fcf023cb8dde7e40d6ed6f8925bc2cc3a8c82.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6dcc35798428e7dbab212303a83fcf023cb8dde7e40d6ed6f8925bc2cc3a8c82.exe
Resource
win10v2004-20220812-en
General
-
Target
6dcc35798428e7dbab212303a83fcf023cb8dde7e40d6ed6f8925bc2cc3a8c82
-
Size
141KB
-
MD5
655c9a6e8a3adb1807893ea5fa2114de
-
SHA1
23f6cfc55b8ab8ebc2c79a62f8ae5c3f0713615e
-
SHA256
6dcc35798428e7dbab212303a83fcf023cb8dde7e40d6ed6f8925bc2cc3a8c82
-
SHA512
c5a659aca4edacd18e7226212be66e3aa9371b407dfbab76bb10c229f90ec618bca59af8a0cc21cc49a50296e636d0cae61244f103fe53644f0313caeb6db7e6
-
SSDEEP
3072:hTAH9RJHH6IHyaNKxE+XhpHzmJgf6aSt9GGGRqd3I:hAJnBysKxVRRzmJgyaF0I
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6dcc35798428e7dbab212303a83fcf023cb8dde7e40d6ed6f8925bc2cc3a8c82.exe windows x86
d546c5774e08d4bda597e81d2636df47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_vsnwprintf
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_wcsicmp
??3@YAXPAX@Z
??2@YAPAXI@Z
iswdigit
_onexit
wcslen
advapi32
RegisterTraceGuidsW
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
TraceEvent
UnregisterTraceGuids
kernel32
GetProcessHeap
HeapCreate
GetSystemInfo
InterlockedExchange
SetThreadUILanguage
RaiseException
InterlockedIncrement
HeapAlloc
InterlockedDecrement
HeapFree
GetCurrentProcessId
LocalFree
LocalAlloc
FreeLibrary
GetProcAddress
LoadLibraryW
SetErrorMode
GetLastError
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
FormatMessageW
WriteFile
WideCharToMultiByte
GetConsoleOutputCP
WriteConsoleW
GetFileType
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
shell32
ShellExecuteExW
SHGetFolderPathW
mscoree
GetRealProcAddress
LoadLibraryShim
CorBindToRuntimeEx
user32
LoadStringW
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE