Behavioral task
behavioral1
Sample
df1390a8dedc84ea80addf5f427fc238679e481fbd6c2a328f63c8d0094fb2a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df1390a8dedc84ea80addf5f427fc238679e481fbd6c2a328f63c8d0094fb2a2.exe
Resource
win10v2004-20220901-en
General
-
Target
df1390a8dedc84ea80addf5f427fc238679e481fbd6c2a328f63c8d0094fb2a2
-
Size
54KB
-
MD5
60cb3e831063b2d943603864bf8e6101
-
SHA1
29598286fffbd525916b4960b70a727e6f94c737
-
SHA256
df1390a8dedc84ea80addf5f427fc238679e481fbd6c2a328f63c8d0094fb2a2
-
SHA512
cd2d4b285b4da37df529045428da4034693cb322ed5efa6116806bbfc70f61ec43e0bf12a2172d7b977e12713233b88558c6d7f67760288c6e0e363b02254181
-
SSDEEP
1536:0hw3lwzxI4FNsXtTli+unON9oiKOKwwX5DOTOkT:dlExI4FNs9Toh2G5JXJs
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
df1390a8dedc84ea80addf5f427fc238679e481fbd6c2a328f63c8d0094fb2a2.exe windows x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE