Behavioral task
behavioral1
Sample
4fe8c6bf945640878864b0d91281c7221fda6d5a96d216c061397d0028221985.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4fe8c6bf945640878864b0d91281c7221fda6d5a96d216c061397d0028221985.exe
Resource
win10v2004-20220812-en
General
-
Target
4fe8c6bf945640878864b0d91281c7221fda6d5a96d216c061397d0028221985
-
Size
224KB
-
MD5
6433551613de76acc6b6b9cc26553050
-
SHA1
26b7c7314e1d7126ceecef6b33f324c74bf38769
-
SHA256
4fe8c6bf945640878864b0d91281c7221fda6d5a96d216c061397d0028221985
-
SHA512
b2800333c4c9f8ed2b1c1e84912500f676ec144065914bcc96f8e8ce69ca446cf51d1dfaff54f43a1f9bea972e1d069d38dc27117aee23a45f52d519298a43c3
-
SSDEEP
6144:u6xEMVCemk/UQqEKRPL7i2ugS2sorn8Ab:ugPPmzdEAQMbr8
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4fe8c6bf945640878864b0d91281c7221fda6d5a96d216c061397d0028221985.exe windows x86
b671321f63147a44e93a4098de6a9d9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
swscanf
iswctype
_wcsicmp
_fmode
_wfopen
fgetws
fclose
wcscmp
localeconv
atoi
_local_unwind2
_snwprintf
_snprintf
towupper
swprintf
wcsstr
wcscat
wcsrchr
wcschr
wcscspn
wcsncmp
wcsncat
wcscpy
memmove
??3@YAXPAX@Z
??2@YAPAXI@Z
wcslen
wcsncpy
_wtoi
_except_handler3
advapi32
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeValueW
OpenProcessToken
SetSecurityDescriptorDacl
FreeSid
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AdjustTokenPrivileges
kernel32
GetFileInformationByHandle
IsDebuggerPresent
OutputDebugStringA
GetLocalTime
FlushFileBuffers
LocalFree
SetErrorMode
DeviceIoControl
GlobalHandle
ExitThread
QueryPerformanceCounter
QueryPerformanceFrequency
GetComputerNameW
SetEvent
OpenEventW
GetCommandLineW
CreateThread
GetSystemPowerStatus
GetVersionExW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
SetFilePointer
GetCurrentProcess
GlobalLock
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalSize
GlobalAlloc
HeapFree
GetProcessHeap
HeapAlloc
SetLastError
ReadFile
WriteFile
InterlockedIncrement
InterlockedDecrement
Sleep
CloseHandle
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcpyW
GetFileSize
CreateFileW
ReleaseMutex
lstrcatW
FormatMessageW
GetCurrentThreadId
lstrlenW
GetTimeFormatW
GetDateFormatW
WaitForSingleObject
lstrcpynW
SizeofResource
FindResourceW
lstrcmpiW
CompareStringW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
lstrcmpW
SystemTimeToFileTime
GetVolumeNameForVolumeMountPointW
GetDriveTypeW
FindVolumeMountPointClose
FindNextVolumeMountPointW
FindFirstVolumeMountPointW
LoadLibraryW
GetVolumeInformationW
gdi32
GetStockObject
user32
LoadStringW
CharUpperW
wvsprintfA
SendMessageW
MessageBoxW
RegisterClassW
LoadCursorW
CreateWindowExW
SetTimer
KillTimer
PostQuitMessage
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
wsprintfW
DefWindowProcW
ntdll
NtQueryVolumeInformationFile
RtlInitializeGenericTableAvl
NtQueryInformationFile
RtlIsGenericTableEmptyAvl
RtlEnumerateGenericTableLikeADirectory
RtlDeleteElementGenericTableAvl
RtlInsertElementGenericTableAvl
RtlEnumerateGenericTableAvl
NtFsControlFile
NtWaitForSingleObject
RtlNumberGenericTableElementsAvl
comctl32
ord17
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ole32
CoInitializeEx
CoUninitialize
CoCreateInstanceEx
CLSIDFromString
CoInitializeSecurity
ReleaseStgMedium
CoRegisterClassObject
vssapi
ord5
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE