Behavioral task
behavioral1
Sample
e8a85898b3040d0175aa9d400ce89d165cf012a142fd11368b84a09c27d058f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8a85898b3040d0175aa9d400ce89d165cf012a142fd11368b84a09c27d058f7.exe
Resource
win10v2004-20220812-en
General
-
Target
e8a85898b3040d0175aa9d400ce89d165cf012a142fd11368b84a09c27d058f7
-
Size
395KB
-
MD5
42d89371937d98b315660d1b1fca4960
-
SHA1
2cf2b83b8ac658b7d564c184c56c8e86124a5ab8
-
SHA256
e8a85898b3040d0175aa9d400ce89d165cf012a142fd11368b84a09c27d058f7
-
SHA512
b0ea4d56a0264e2fa705e4867e8caf427c84deb6fc36ed7ddd1cc815e1afe631e8ec0daba887e3b659cde9dba557514b303d0f86b8462815f0bd03a43afdb128
-
SSDEEP
6144:oriny2xr+oqvUpEkXhCaVbJRdgHgnuoE681zPHM/4/3S7o:Q2xioqNnalJRdgHZoEXRs/4v+o
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e8a85898b3040d0175aa9d400ce89d165cf012a142fd11368b84a09c27d058f7.exe windows x86
2b25a1483a4f24dcae91318e2eb861d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
GetFileSize
GetFileTime
CloseHandle
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
lstrcpyW
GlobalMemoryStatus
LoadLibraryW
GetProcAddress
lstrcatW
GetTempPathW
SetFilePointer
GetModuleFileNameW
GetTimeFormatW
GetDateFormatW
CreateProcessW
SetUnhandledExceptionFilter
FreeLibrary
SetDllDirectoryW
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
RaiseException
OutputDebugStringW
WriteFile
lstrlenW
MultiByteToWideChar
IsDebuggerPresent
lstrlenA
InitializeCriticalSection
GetVersionExW
lstrcpynW
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetLastError
HeapFree
TerminateProcess
UnhandledExceptionFilter
Sleep
HeapSize
GetModuleHandleW
ExitProcess
HeapAlloc
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
HeapReAlloc
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
FlushFileBuffers
CreateMutexW
OpenMutexW
ReleaseMutex
OutputDebugStringA
user32
LoadAcceleratorsW
FindWindowW
DefWindowProcW
PostQuitMessage
SendMessageTimeoutW
SendMessageW
wsprintfW
DispatchMessageW
KillTimer
SetTimer
UpdateWindow
GetMessageW
TranslateAcceleratorW
TranslateMessage
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
wvsprintfW
advapi32
RegCloseKey
RegOpenKeyExW
GetUserNameW
shlwapi
SHGetValueW
PathRemoveFileSpecW
PathCombineW
dbghelp
MiniDumpWriteDump
psapi
GetModuleBaseNameW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX Size: 241KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE