Behavioral task
behavioral1
Sample
25a8851a4550608d1fa35076f6ddd0fbdbdc9197e1cb6a9d33104d682e5e1be5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25a8851a4550608d1fa35076f6ddd0fbdbdc9197e1cb6a9d33104d682e5e1be5.exe
Resource
win10v2004-20220812-en
General
-
Target
25a8851a4550608d1fa35076f6ddd0fbdbdc9197e1cb6a9d33104d682e5e1be5
-
Size
267KB
-
MD5
64c1372f8a80e560e8d7cc956787a054
-
SHA1
3b0670ce9e03418607d65936af62ea6c6499f3a0
-
SHA256
25a8851a4550608d1fa35076f6ddd0fbdbdc9197e1cb6a9d33104d682e5e1be5
-
SHA512
5f82f0f191682da3b36020326b7f241e0408d901fd7cbf50be261a36f86c170126021a2d9b1b1ce441e3280bc3c265e676f97caee2a791ad017045aca71f6191
-
SSDEEP
3072:gSIptA+8xCJXoJN+qvFur7F1PYUGQQEKGLY+q+XrNJd2/GP+ohVLD/xi3V7JRWmn:QptA+oGpNJlpi3VNBuRGt0dE
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
25a8851a4550608d1fa35076f6ddd0fbdbdc9197e1cb6a9d33104d682e5e1be5.exe windows x86
8e23ea4e8893b3f15b56fa24a69947a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerInstallFileA
kernel32
AddAtomA
SetEvent
GetModuleHandleA
GetStartupInfoA
HeapCreate
lstrcpyA
OpenEventA
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
LockResource
LoadResource
FindResourceA
FindResourceExA
GetCommandLineA
FormatMessageA
InterlockedDecrement
GetAtomNameA
RemoveDirectoryA
CopyFileA
GetTempFileNameA
GetTempPathA
WaitForSingleObject
SetFileAttributesA
GetLastError
ReadFile
GetShortPathNameA
GetWindowsDirectoryA
GetFileAttributesA
CreateDirectoryA
SetLastError
lstrlenA
CompareStringA
GetPrivateProfileStringA
GetVersionExA
GlobalLock
GlobalAlloc
GetUserDefaultLangID
GetModuleFileNameA
RtlUnwind
DeleteFileA
Sleep
CloseHandle
lstrlenW
WideCharToMultiByte
GlobalUnlock
GlobalFree
MultiByteToWideChar
GetPrivateProfileIntA
CreateProcessA
CreateFileA
SetErrorMode
LocalFree
CompareStringW
user32
TranslateMessage
PeekMessageA
GetWindowLongA
EndDialog
GetDlgItem
SendMessageA
SetWindowLongA
DispatchMessageA
IsDialogMessageA
CreateDialogIndirectParamA
SetDlgItemTextA
GetDesktopWindow
GetClientRect
GetWindowRect
MoveWindow
CharNextA
CharUpperA
CharLowerA
ReleaseDC
LoadImageA
GetDC
EndPaint
CreateDialogParamA
BeginPaint
DialogBoxIndirectParamA
MessageBoxA
DestroyWindow
wsprintfA
gdi32
BitBlt
RealizePalette
SelectPalette
UnrealizeObject
CreateCompatibleDC
GetObjectA
GetDeviceCaps
CreateHalftonePalette
CreatePalette
GetSystemPaletteEntries
GetDIBColorTable
DeleteDC
SelectObject
advapi32
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
ole32
CoCreateInstance
CoFreeAllLibraries
CoInitialize
CoUninitialize
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
SafeArrayGetLBound
VariantClear
SafeArrayGetElement
SysAllocString
SafeArrayGetUBound
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE