Behavioral task
behavioral1
Sample
413e7636857b429d8ee25a599a1902c46e61d4db3f3b0e885f825410f0e4a1a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
413e7636857b429d8ee25a599a1902c46e61d4db3f3b0e885f825410f0e4a1a6.exe
Resource
win10v2004-20220812-en
General
-
Target
413e7636857b429d8ee25a599a1902c46e61d4db3f3b0e885f825410f0e4a1a6
-
Size
117KB
-
MD5
6042275320ee00063687a243ca56de98
-
SHA1
d4b650c315d9ffa99321b8d92bf04a0169301b6e
-
SHA256
413e7636857b429d8ee25a599a1902c46e61d4db3f3b0e885f825410f0e4a1a6
-
SHA512
04a4337acb66a73d6a958164e26d169ce9741404c44423bfcc932f0fec6859681d7649c2edbc7f5d453c6a341dde1900e6d5185bd7b3dcad4e6750cf5ec22591
-
SSDEEP
3072:mj+m5TU9UnFshF5KnOs9vLfhZRTxMJUbihYQ:jmOCFshFoHxFZun
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
413e7636857b429d8ee25a599a1902c46e61d4db3f3b0e885f825410f0e4a1a6.exe windows x86
b6395b8daca6076e6dae612ded313ce8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetWindowsDirectoryA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapSetInformation
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
_controlfp
__p__commode
?terminate@@YAXXZ
__set_app_type
__p__fmode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_except_handler4_common
shell32
ShellExecuteA
shlwapi
PathAppendA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 892B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE