Behavioral task
behavioral1
Sample
adbf9f590324c03f1597bb4af68e66d398ff69fa27a427a08062d9c46ba89f60.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
adbf9f590324c03f1597bb4af68e66d398ff69fa27a427a08062d9c46ba89f60.exe
Resource
win10v2004-20220901-en
General
-
Target
adbf9f590324c03f1597bb4af68e66d398ff69fa27a427a08062d9c46ba89f60
-
Size
148KB
-
MD5
1e3db075bc182169d03fc3aacd779777
-
SHA1
8fa3530fe10ca7eff1a68be352f6418461475cb8
-
SHA256
adbf9f590324c03f1597bb4af68e66d398ff69fa27a427a08062d9c46ba89f60
-
SHA512
b04d9c598cc457abb2272fcd58e2872121469042013174c4b1fb3f368bcbba4602595f7ed6894ad0cf1d6bb2ee215535fc98508744d09562c83e23bff6568745
-
SSDEEP
3072:NdqENo93mKhmvUMEBnBpN4CMIsko5y2lUcpl+:9K93QnEJ3+Z42BS
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
adbf9f590324c03f1597bb4af68e66d398ff69fa27a427a08062d9c46ba89f60.exe windows x86
0ae6c8f83d498a405f2dd03ea6a517e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
UnmapViewOfFile
LocalFree
SetEvent
WaitForSingleObject
LocalAlloc
CreateEventA
GetLastError
CreateFileMappingA
MapViewOfFile
GetProcAddress
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapAlloc
VirtualAlloc
HeapReAlloc
LoadLibraryA
advapi32
RegCloseKey
RegisterServiceCtrlHandlerA
SetServiceStatus
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
StartServiceCtrlDispatcherA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE