Behavioral task
behavioral1
Sample
5d15eb3ed6fea4b545398223a503657e8bf3c8414db8856d8c518b9b3a544b3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d15eb3ed6fea4b545398223a503657e8bf3c8414db8856d8c518b9b3a544b3d.exe
Resource
win10v2004-20220812-en
General
-
Target
5d15eb3ed6fea4b545398223a503657e8bf3c8414db8856d8c518b9b3a544b3d
-
Size
489KB
-
MD5
09361347b4105d773b821a1195dead00
-
SHA1
3db4b1b3a96db0397380e647724587f9eeb7e1af
-
SHA256
5d15eb3ed6fea4b545398223a503657e8bf3c8414db8856d8c518b9b3a544b3d
-
SHA512
41e9327d81378f13f24200b729403c0b560287646757afe02f3c75a7d6e9e6f4e923360feee107a054c61acab69507f1be90fc76a388539de63a3b33327fd33c
-
SSDEEP
12288:cItmQe8cL4+N6jo3cbDvJAmTs9C+hGaCk:7e8cM+N13OW4Dk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5d15eb3ed6fea4b545398223a503657e8bf3c8414db8856d8c518b9b3a544b3d.exe windows x86
a470dd707b0ff61e8bf846e226d3848b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleCount
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetACP
GetOEMCP
GetStdHandle
GetFileType
HeapDestroy
HeapSize
GetCPInfo
VirtualAlloc
LCMapStringA
GetEnvironmentStringsW
VirtualFree
GetCurrentThreadId
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
HeapCreate
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
lstrlenA
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
CloseHandle
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetProfileStringA
RaiseException
HeapFree
TerminateProcess
HeapReAlloc
GetCommandLineA
HeapAlloc
ExitProcess
RtlUnwind
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
GetTickCount
FileTimeToSystemTime
GetFileAttributesA
GetFileTime
GetFileSize
FormatMessageA
SetErrorMode
GlobalAddAtomA
GetModuleFileNameA
GetVersionExA
SizeofResource
GetThreadLocale
FindFirstFileA
GetFullPathNameA
GetVolumeInformationA
GetProcAddress
FindClose
LoadLibraryA
FreeLibrary
LockFile
SetEndOfFile
UnlockFile
WriteFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
ReadFile
CreateFileA
GetLastError
DuplicateHandle
GetProcessVersion
lstrcpyA
SetLastError
WritePrivateProfileStringA
LocalReAlloc
GlobalFlags
TlsGetValue
GlobalReAlloc
TlsSetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
TlsAlloc
lstrcpynA
LocalFree
LocalAlloc
MulDiv
SetStdHandle
LCMapStringW
SetUnhandledExceptionFilter
user32
SetMenu
InflateRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
IntersectRect
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
RegisterClipboardFormatA
LoadMenuA
PostThreadMessageA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
SystemParametersInfoA
MapWindowPoints
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScrollWindow
SetScrollInfo
ShowScrollBar
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
GetSysColor
FindWindowA
GetDlgCtrlID
DefWindowProcA
CharUpperA
OffsetRect
SetPropA
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindowRect
SetWindowLongA
RegisterWindowMessageA
MapDialogRect
SetWindowPos
GetWindow
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
MessageBeep
SetRect
CopyAcceleratorTableA
CharNextA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
SetWindowsHookExA
MessageBoxA
ShowOwnedPopups
PostQuitMessage
PostMessageA
EnableWindow
GetCursorPos
ScreenToClient
RedrawWindow
InvalidateRect
GetWindowTextLengthA
GetNextDlgGroupItem
GetWindowTextA
LoadBitmapA
LoadCursorA
SetCursor
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
GetSysColorBrush
GetClassNameA
PtInRect
ClientToScreen
WindowFromPoint
ReleaseCapture
GetDesktopWindow
DrawTextA
GrayStringA
BeginPaint
TabbedTextOutA
EndPaint
GetWindowDC
LoadStringA
GetDC
ShowWindow
ReleaseDC
DestroyMenu
CreateWindowExA
MoveWindow
GetClassLongA
SetWindowTextA
DefDlgProcA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
UnregisterClassA
IsWindowUnicode
gdi32
SetBkColor
DeleteDC
PatBlt
SaveDC
RestoreDC
GetStockObject
SelectObject
SetBkMode
SetMapMode
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
CreateBitmap
IntersectClipRect
DeleteObject
GetDeviceCaps
GetWindowExtEx
GetViewportExtEx
CreateSolidBrush
PtVisible
TextOutA
ExtTextOutA
RectVisible
GetTextExtentPointA
Escape
GetTextColor
GetBkColor
LPtoDP
GetMapMode
DPtoLP
CreateDIBitmap
CreateCompatibleDC
BitBlt
SetTextColor
GetObjectA
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
DragFinish
DragQueryFileA
comctl32
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemFree
CoGetClassObject
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
CoRegisterMessageFilter
StgCreateDocfileOnILockBytes
CoRevokeClassObject
OleFlushClipboard
CoTaskMemAlloc
oleaut32
SysAllocStringLen
SysFreeString
VariantClear
OleCreateFontIndirect
SysAllocString
VariantChangeType
SysAllocStringByteLen
SysStringLen
Sections
.text Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 241KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE