Behavioral task
behavioral1
Sample
6ed386f9589db1b7c6dd9c840137ebb8cc26f0e95b6c9a36d9b690b8a8378924.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ed386f9589db1b7c6dd9c840137ebb8cc26f0e95b6c9a36d9b690b8a8378924.exe
Resource
win10v2004-20220812-en
General
-
Target
6ed386f9589db1b7c6dd9c840137ebb8cc26f0e95b6c9a36d9b690b8a8378924
-
Size
156KB
-
MD5
60543e137ea00267eb5e93a2a25a72fa
-
SHA1
801c4adebe4e2c8d69366dda45bed45b1833aeb8
-
SHA256
6ed386f9589db1b7c6dd9c840137ebb8cc26f0e95b6c9a36d9b690b8a8378924
-
SHA512
2ef2dd13402f4f1947a011ebe02d218fafe4e710f555dac8e9a5d4252c1a9cb367159203154e07bbfb23651a2e308571778b6e3f80813fe45fdc43e75557546d
-
SSDEEP
3072:UP6DvEpS30c37LAZ6wUwG23/Yzbuhd4Wiuirc/K0JTFKHD2V3OQxI1aT+d8flIP:DDcpSXLAZ6bwh/AbO4Wilrn0VC2V3OQu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6ed386f9589db1b7c6dd9c840137ebb8cc26f0e95b6c9a36d9b690b8a8378924.exe windows x86
127367dd27cc106658c84c8f4158f58c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord151
ord77
ord148
ord44
ord17
ord124
ord170
ord67
ord152
ord8
shell32
ShellExecuteExA
ole32
StgOpenStorage
StgCreateDocfile
user32
ExitWindowsEx
MessageBoxA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
kernel32
CloseHandle
FlushFileBuffers
HeapSize
SetStdHandle
ReadFile
HeapReAlloc
InitializeCriticalSection
SetFilePointer
LoadLibraryA
VirtualQuery
GetSystemInfo
VirtualAlloc
LCMapStringA
GetLastError
MultiByteToWideChar
DeleteFileA
GetTempFileNameA
GetTempPathA
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
GetCurrentProcess
GetVersionExA
LockResource
LoadResource
FindResourceExA
FreeLibrary
LoadLibraryExA
CopyFileA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
WideCharToMultiByte
LCMapStringW
GetProcAddress
TerminateProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetStringTypeA
GetStringTypeW
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
GetLocaleInfoA
RtlUnwind
GetACP
GetOEMCP
VirtualProtect
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE