Behavioral task
behavioral1
Sample
2b9444f93bb01bc136542d71c9c7d3f93058e6e58d4da49991b8a3c30b03c030.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2b9444f93bb01bc136542d71c9c7d3f93058e6e58d4da49991b8a3c30b03c030.exe
Resource
win10v2004-20220812-en
General
-
Target
2b9444f93bb01bc136542d71c9c7d3f93058e6e58d4da49991b8a3c30b03c030
-
Size
184KB
-
MD5
49f24b10be5f2299d02e7519d8fa5fe1
-
SHA1
450dda1767daf6ca011939c6e0a24d211aee0c10
-
SHA256
2b9444f93bb01bc136542d71c9c7d3f93058e6e58d4da49991b8a3c30b03c030
-
SHA512
598773a94e2cfb83f79b0274aea5c5688244e98e3216fd230c61748c98d631036bfd916b30a4f807611e7d0259aa97445421c7057f13e6860a7d14f7c876312f
-
SSDEEP
3072:sGgKnlt7U8kn5iBYW9aLASDcRqFqudioiJktZPUPEUSUb6liZwmfnllBo1XYZyZt:lgKo8kn5iBh9aLASgR4dMJiU3SUb6liS
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
2b9444f93bb01bc136542d71c9c7d3f93058e6e58d4da49991b8a3c30b03c030.exe windows x86
04a41b0df20d37c1a359fae630e85393
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
WaitForSingleObject
OpenEventA
MapViewOfFile
OpenFileMappingA
CreateMutexA
GetVersionExA
FreeLibrary
GetProcAddress
LoadLibraryA
SetConsoleCtrlHandler
AllocConsole
CreateThread
GetLastError
CreateProcessA
GetStartupInfoA
WaitForMultipleObjects
CreateEventA
OpenFile
lstrcatA
GetSystemDirectoryA
SetPriorityClass
ReleaseMutex
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapReAlloc
VirtualAlloc
HeapAlloc
GetCPInfo
GetOEMCP
VirtualQuery
GetACP
HeapFree
VirtualFree
HeapCreate
CloseHandle
UnmapViewOfFile
GetCurrentProcess
SetLastError
GetModuleHandleA
GetCommandLineA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
user32
MessageBoxA
DefWindowProcA
DestroyWindow
LoadStringA
FindWindowA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
PostMessageA
PostQuitMessage
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE