Behavioral task
behavioral1
Sample
f6184d694736cba650e646430973f78f8bed9c37c93f56aedc4c937393a99b84.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6184d694736cba650e646430973f78f8bed9c37c93f56aedc4c937393a99b84.exe
Resource
win10v2004-20220812-en
General
-
Target
f6184d694736cba650e646430973f78f8bed9c37c93f56aedc4c937393a99b84
-
Size
272KB
-
MD5
439d67734770cd3c8beb69048ae8626b
-
SHA1
5be138d296082ed7b0ee2261d9afbaf94c357730
-
SHA256
f6184d694736cba650e646430973f78f8bed9c37c93f56aedc4c937393a99b84
-
SHA512
e352c3e47527f31db84289f67c5b325543278ed6803d678bb2555d827f66a3cbf51d96d7fc0b7aa45f8d406489410e1dbb1315b8e2a0b46b421390e6dd6b6e1c
-
SSDEEP
3072:siZj+JbvcYWa5L6pf5XaFmTa7F++PRFBkbq8GhmZE2fAl+/UBro22oSBVu70YL9+:vZj+JbvJhw+mgmNPTpVaH23/UOAA
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f6184d694736cba650e646430973f78f8bed9c37c93f56aedc4c937393a99b84.exe windows x86
f61c9957ecd575baa0267b75896c458d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
LoadLibraryExW
VerifyVersionInfoW
GetModuleHandleW
SizeofResource
VerSetConditionMask
LockResource
GetLastError
FindResourceExW
FindResourceW
GetProcAddress
lstrlenW
GetCommandLineW
GetFileAttributesExW
FreeLibrary
GetModuleFileNameW
LoadResource
SystemTimeToFileTime
GetSystemTime
CompareFileTime
SetLastError
LocalAlloc
CloseHandle
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
WideCharToMultiByte
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
RtlUnwind
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InterlockedExchange
LoadLibraryA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
CreateFileA
ole32
CoCreateGuid
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 148KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE