Behavioral task
behavioral1
Sample
d73c56413bde2e48ee9522019550f067810b240bb1dc322b33dfb6ddbe30f1b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d73c56413bde2e48ee9522019550f067810b240bb1dc322b33dfb6ddbe30f1b9.exe
Resource
win10v2004-20220812-en
General
-
Target
d73c56413bde2e48ee9522019550f067810b240bb1dc322b33dfb6ddbe30f1b9
-
Size
52KB
-
MD5
628e4c8035c6c41d41e1a3d75e4c8950
-
SHA1
3d8ff9e48d7c86fb9d642251495c1ec9db04e868
-
SHA256
d73c56413bde2e48ee9522019550f067810b240bb1dc322b33dfb6ddbe30f1b9
-
SHA512
316928f1b7d427eef254bea9eb8636ff6e84967c84d57972ac1926036b5c2b1b5776bf0fee4aa5aa562cba9b4cbf87a9230c94d719c546c438b2bfc4b6c547dd
-
SSDEEP
768:Whh1YzCqdKtyZoDtBbLDUZrjzB2FOG0hy4Rug90Ya4AFnk8B:Whh1cCmK28BbLDKtgNmyQP90Yx+nv
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d73c56413bde2e48ee9522019550f067810b240bb1dc322b33dfb6ddbe30f1b9.exe windows x86
ed4eacde487aeeeb85052840a7bd4d43
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CloseHandle
CreateFileA
Sleep
LoadLibraryA
OpenMutexA
CreateMutexA
CreateProcessA
GetTickCount
GetEnvironmentVariableA
DeleteFileA
ExitProcess
GetCurrentProcessId
VirtualProtect
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
SetStdHandle
GetSystemInfo
user32
MessageBoxA
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetSetOptionA
HttpQueryInfoA
InternetReadFile
Sections
UPX0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE