Behavioral task
behavioral1
Sample
1c72fa3c0029b9cf987b0b8be2e226f07c5b6baeba28c9a039b8c01deb546967.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1c72fa3c0029b9cf987b0b8be2e226f07c5b6baeba28c9a039b8c01deb546967.exe
Resource
win10v2004-20220812-en
General
-
Target
1c72fa3c0029b9cf987b0b8be2e226f07c5b6baeba28c9a039b8c01deb546967
-
Size
330KB
-
MD5
660d9a0d73b420e22b3552dd14755d14
-
SHA1
2697b4d0623e42eb0d55a0b2ac8755429296262e
-
SHA256
1c72fa3c0029b9cf987b0b8be2e226f07c5b6baeba28c9a039b8c01deb546967
-
SHA512
845ad135ece7138f038c31454b9474097797d2d26ec0fa0546501dec660e121d626a9a7a9e5747477c0ed3c071c94198d4074c166e6319856ab981b8d305890d
-
SSDEEP
6144:OXElKYAGBzf4AtCiaycBdr7/rry773kEsPBbmInb4PtRH8:OXElKMr4AjaywrW770E9t
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1c72fa3c0029b9cf987b0b8be2e226f07c5b6baeba28c9a039b8c01deb546967.exe windows x86
25a8164eab592477f82700ee1267c0e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
comdlg32
GetOpenFileNameA
GetOpenFileNameW
oleaut32
SysStringByteLen
VariantCopy
VariantClear
SysAllocString
ole32
CoInitialize
CoUninitialize
user32
DialogBoxParamW
DialogBoxParamA
SetWindowLongA
GetWindowLongA
GetWindowRect
MoveWindow
SystemParametersInfoA
GetWindowTextLengthW
GetWindowTextW
GetWindowTextLengthA
GetWindowTextA
SetWindowTextW
SendMessageW
LoadStringW
InvalidateRect
CharPrevA
CharUpperW
CharUpperA
LoadIconA
IsWindowEnabled
SetWindowTextA
IsDlgButtonChecked
ShowWindow
CheckDlgButton
MessageBoxW
wsprintfA
KillTimer
EndDialog
EnableWindow
SetDlgItemTextA
GetDlgItem
SendMessageA
SetTimer
PostMessageA
LoadCursorA
ScreenToClient
MapDialogRect
SetCursor
LoadStringA
advapi32
RegOpenKeyExA
RegQueryValueExW
RegQueryValueExA
RegSetValueExW
RegSetValueExA
RegDeleteValueW
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
SHGetMalloc
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
memset
_iob
wcsncmp
free
malloc
memcpy
wcslen
memcmp
_purecall
memmove
_CxxThrowException
__CxxFrameHandler
_isatty
_controlfp
_fileno
kernel32
SetPriorityClass
WaitForMultipleObjects
GetDriveTypeA
FileTimeToLocalFileTime
GetProcessTimes
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
OpenEventA
GetStdHandle
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
GetModuleHandleW
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
VirtualAlloc
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
SearchPathW
SearchPathA
GetCurrentDirectoryW
SetCurrentDirectoryW
SetCurrentDirectoryA
VirtualFree
WaitForSingleObject
CreateEventA
SetEvent
InitializeCriticalSection
GetStartupInfoA
MoveFileW
SetEndOfFile
GetCurrentDirectoryA
GetFullPathNameW
GetFullPathNameA
lstrlenA
DeleteFileW
DeleteFileA
CreateDirectoryW
RemoveDirectoryW
SetFileAttributesW
MoveFileA
RemoveDirectoryA
SetFileAttributesA
SetLastError
CreateFileW
SetFileTime
CloseHandle
GetWindowsDirectoryW
GetWindowsDirectoryA
FormatMessageW
FormatMessageA
LocalFree
GetModuleFileNameW
GetModuleFileNameA
AreFileApisANSI
LoadLibraryA
LoadLibraryExA
FreeLibrary
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetVersionExA
DeleteCriticalSection
Sleep
GetTickCount
lstrcatA
LeaveCriticalSection
EnterCriticalSection
CreateDirectoryA
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE