Behavioral task
behavioral1
Sample
74cf1f632b713bc6a376b47b602c111a09059870edc4b5f862cf42a4212dc5a8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
74cf1f632b713bc6a376b47b602c111a09059870edc4b5f862cf42a4212dc5a8.exe
Resource
win10v2004-20220901-en
General
-
Target
74cf1f632b713bc6a376b47b602c111a09059870edc4b5f862cf42a4212dc5a8
-
Size
132KB
-
MD5
639c9f965d7770dc580703c12729cdd0
-
SHA1
43cf321d7a5c9cf0c922d818ef3094e3b90f97d1
-
SHA256
74cf1f632b713bc6a376b47b602c111a09059870edc4b5f862cf42a4212dc5a8
-
SHA512
a9e290cbcd8601dfebaaefd61dd10eb82ab5797cf7ad3e781ea2ccd4dfdd9f88251740a8356efa3b8a0f3f437ecba65d9858cc5cfe600c1c2b356a11506ee509
-
SSDEEP
3072:FtJT9hiTXh1G0abvFUpS4PgYsZcoqnqLqwGGHRmr:7+xUbYBsZWnqDGaRk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
74cf1f632b713bc6a376b47b602c111a09059870edc4b5f862cf42a4212dc5a8.exe windows x86
4f3d018219fbb4a07ba0fbce29725244
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winsta
WinStationEnumerateW
WinStationFreeMemory
WinStationOpenServerW
WinStationGetAllProcesses
WinStationFreeGAPMemory
WinStationEnumerateProcesses
WinStationQueryInformationW
utildll
GetUnknownString
user32
OemToCharBuffW
CharToOemW
LoadStringW
kernel32
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
UnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
CloseHandle
GetLastError
GetCurrentProcess
WideCharToMultiByte
SetFileApisToOEM
GetCurrentProcessId
SetThreadUILanguage
GetConsoleOutputCP
HeapSetInformation
FreeLibrary
LoadLibraryW
SetLastError
MultiByteToWideChar
WriteConsoleW
GetFileType
GetStdHandle
GetModuleHandleW
FormatMessageW
GetACP
GetOEMCP
LocalFree
LocalAlloc
VerifyVersionInfoW
VerSetConditionMask
GetCommandLineW
GetFileAttributesW
FindClose
FindNextFileW
FindFirstFileW
TerminateProcess
GetSystemTimeAsFileTime
InterlockedExchange
ntdll
RtlInitializeCriticalSection
RtlLeaveCriticalSection
RtlEnterCriticalSection
advapi32
LookupPrivilegeValueW
OpenProcessToken
LookupAccountSidW
GetLengthSid
AdjustTokenPrivileges
msvcrt
fwprintf
malloc
memcpy
free
wcschr
vfwprintf
vswprintf_s
_ultoa
wcscat_s
memset
printf
wprintf
_wcsicmp
wcstol
iswdigit
_wcsnicmp
wcstoul
memmove
_wcsdup
__getmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
setlocale
_wsetlocale
swprintf_s
wcscpy_s
_wcslwr
fprintf
_iob
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE