Behavioral task
behavioral1
Sample
b0def3c6ba7a5837b7e69e12e5cf96c329cee5267d19988cff65cef7311f9f68.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0def3c6ba7a5837b7e69e12e5cf96c329cee5267d19988cff65cef7311f9f68.exe
Resource
win10v2004-20220812-en
General
-
Target
b0def3c6ba7a5837b7e69e12e5cf96c329cee5267d19988cff65cef7311f9f68
-
Size
263KB
-
MD5
74b27134ee4cce4445bb6a86490a9e7c
-
SHA1
7d109f22f7e4d2d8573fa3c9beb6c8074be20e64
-
SHA256
b0def3c6ba7a5837b7e69e12e5cf96c329cee5267d19988cff65cef7311f9f68
-
SHA512
fb9bb5c84e60e99223efa4cca58a37af326a669f8c55f480daa68a081f6fcabb1a7e0da315c12fa2bfbbed4e36141d112601e987ba6200a2471f527f0e409e73
-
SSDEEP
6144:hwlcgK7nf7mW4vqCzlxx6szG2exk/yfjl/C:XgQnf7mZvqCzlxpKim4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b0def3c6ba7a5837b7e69e12e5cf96c329cee5267d19988cff65cef7311f9f68.exe windows x86
c6f240cd8986b0d3fd4d0ab205943d36
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyW
RegCloseKey
kernel32
InterlockedIncrement
InterlockedDecrement
Sleep
GetVersionExW
GetLastError
CreateFileW
DeviceIoControl
CloseHandle
ExitProcess
SetConsoleCtrlHandler
GetComputerNameW
GetProcAddress
GetModuleHandleW
ExpandEnvironmentStringsW
SetFilePointerEx
WriteFile
DefineDosDeviceW
ReleaseMutex
SetEvent
WaitForSingleObject
ResetEvent
CreateMutexW
CreateEventW
TerminateThread
CreateThread
LoadLibraryExA
WideCharToMultiByte
GetConsoleOutputCP
WriteConsoleW
GetConsoleMode
GetFileType
GetStdHandle
FreeLibrary
LoadLibraryExW
LocalFree
LoadLibraryW
FormatMessageW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetVersionExA
RtlUnwind
HeapAlloc
HeapFree
GetModuleHandleA
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
HeapSize
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
VirtualProtect
GetSystemInfo
VirtualQuery
LoadLibraryA
InterlockedExchange
SetFilePointer
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
SetStdHandle
ReadFile
SetEndOfFile
GetProcessHeap
GetLocaleInfoW
GetACP
GetOEMCP
ntdll
NtWriteFile
NtReadFile
rpcrt4
RpcStringBindingComposeW
RpcBindingFromStringBindingW
NdrClientCall2
UuidCreate
RpcStringFreeW
UuidToStringW
UuidFromStringW
RpcBindingFree
ole32
CoUninitialize
CoCreateInstanceEx
CoTaskMemAlloc
CoTaskMemFree
CoInitializeEx
setupapi
SetupDiGetClassDevsW
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
user32
RegisterClassExW
CreateWindowExW
RegisterDeviceNotificationW
GetMessageW
DestroyWindow
LoadStringW
UnregisterDeviceNotification
DispatchMessageW
wsprintfW
DefWindowProcW
PostThreadMessageW
TranslateMessage
Sections
.text Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE