Behavioral task
behavioral1
Sample
29c9df5cfe7e4605c05ed29b1c4824215bcd5b4a1cb01083bb431cbc21a5404f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
29c9df5cfe7e4605c05ed29b1c4824215bcd5b4a1cb01083bb431cbc21a5404f.exe
Resource
win10v2004-20220901-en
General
-
Target
29c9df5cfe7e4605c05ed29b1c4824215bcd5b4a1cb01083bb431cbc21a5404f
-
Size
192KB
-
MD5
4a59663b552c4b311f1a25d8ddd4b37b
-
SHA1
9f37b226caf40b00e1d6aa1398670014f5ab0d31
-
SHA256
29c9df5cfe7e4605c05ed29b1c4824215bcd5b4a1cb01083bb431cbc21a5404f
-
SHA512
b98a86062dea3f953ba01d07e1b389c36e8ce9e720e0c1f1b83a16b068ca875390870bd809e946b9f29931d7049afe4088246b1cdd63d6bd2e954ad6b58cdff5
-
SSDEEP
3072:jQb1+9++zbltE1Yw5+vIz7V3WfVPAAAXRiD8BTIm8t:jQb1+9++k1dAvARcCBiD8JIvt
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
29c9df5cfe7e4605c05ed29b1c4824215bcd5b4a1cb01083bb431cbc21a5404f.exe windows x86
fe79f8f6a8a1c8910dfadcb577201f17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
SearchPathW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
Sleep
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE