Behavioral task
behavioral1
Sample
d0ca997a8f69fa80e42ff26866fc08d8b46c8b924859924a8eb16f9d121f22aa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d0ca997a8f69fa80e42ff26866fc08d8b46c8b924859924a8eb16f9d121f22aa.exe
Resource
win10v2004-20220812-en
General
-
Target
d0ca997a8f69fa80e42ff26866fc08d8b46c8b924859924a8eb16f9d121f22aa
-
Size
266KB
-
MD5
57a5f05db393a5d34eff0de947f83e70
-
SHA1
d261e4d2a8d98db5596133d361c98420c28e59e9
-
SHA256
d0ca997a8f69fa80e42ff26866fc08d8b46c8b924859924a8eb16f9d121f22aa
-
SHA512
ae3c8a971bb6e1da37ff10e90fa1269e49b48389ce76c44ea35f1e0ce3650e8d4c11aa0a764f3b5ca4e19edfd685f329403bc8dfe7728ac950a9deb2f119faed
-
SSDEEP
3072:tW/1lqNqAoPJl+Q7fFOPLfie9rHbK5pWsl8bnDZNnZRfs6pCWtKU7xTVKpfo5Utn:ArDPSgFCqiXIQ28bDr5trKpfo5aoo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d0ca997a8f69fa80e42ff26866fc08d8b46c8b924859924a8eb16f9d121f22aa.exe windows x86
54e009db0d04ac6413ca63a9073a239c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
BeginUpdateResourceW
GetProcAddress
user32
GetSystemMetrics
EnableMenuItem
mouse_event
PostMessageW
LoadMenuIndirectA
IsMenu
SetCursor
DestroyCursor
GetMenuItemID
wvsprintfA
GetMenuInfo
UnregisterClassA
GetScrollPos
FindWindowW
EnableWindow
GetClassInfoExA
CreateAcceleratorTableW
GetIconInfo
keybd_event
SetWindowPos
CreatePopupMenu
CreateMenu
GetCapture
SetDlgItemTextA
GetDlgItemTextW
EnumClipboardFormats
CharLowerA
GetSysColorBrush
CreateDialogParamW
PeekMessageA
AppendMenuA
MonitorFromWindow
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
resutils
ResUtilGetProperty
ResUtilVerifyPropertyTable
ResUtilVerifyResourceService
ResUtilGetBinaryValue
ResUtilSetPropertyParameterBlock
ResUtilFindDependentDiskResourceDriveLetter
ResUtilGetProperties
ResUtilSetPropertyParameterBlockEx
ResUtilGetPropertySize
ResUtilGetAllProperties
ResUtilIsResourceClassEqual
ResUtilVerifyService
ResUtilFindDwordProperty
ResUtilGetResourceDependency
ResUtilSetResourceServiceStartParameters
gdi32
CreateDIBSection
GetMetaFileA
CreateBrushIndirect
GetRasterizerCaps
AddFontResourceA
UpdateICMRegKeyA
GetStockObject
d3d8thk
OsThunkDdGetBltStatus
OsThunkDdDestroyMoComp
OsThunkDdCreateMoComp
OsThunkDdGetDriverInfo
OsThunkDdUnlockD3D
OsThunkDdGetDxHandle
OsThunkDdGetDC
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 3KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 5KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 91KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 130KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 2KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ