Behavioral task
behavioral1
Sample
8d707b73d40efe6b500f52876ed4dc89f60ad99f112bbd70a3d697363143a6d4.exe
Resource
win7-20220901-en
General
-
Target
8d707b73d40efe6b500f52876ed4dc89f60ad99f112bbd70a3d697363143a6d4
-
Size
433KB
-
MD5
664df3dbc0b32edf701aed88e297fe4c
-
SHA1
69d49c404a4ccf625cc00c0d5a9b4c3e1ff32485
-
SHA256
8d707b73d40efe6b500f52876ed4dc89f60ad99f112bbd70a3d697363143a6d4
-
SHA512
e6b7b3abdeb308345dce037ba70e60d921b8193908343057fa47b29727fd7f52fa9cc19e4dcae023f458e648f871c400c4d6439200577486d9fbf8aa23288bba
-
SSDEEP
6144:ndY/wgq55cSAFJVln9r7ZpO3CNf+yxw1r23zdTP6Iz5zNJ:ndzghJTn95dzirQFCML
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8d707b73d40efe6b500f52876ed4dc89f60ad99f112bbd70a3d697363143a6d4.exe windows x86
f1c86bf7ba6c9508e02f21633db7d001
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
ReadFile
CreateDirectoryA
GetPrivateProfileStringA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetProcAddress
DeleteFileA
FreeLibrary
GetTempFileNameA
LoadLibraryA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
lstrcmpA
IsDBCSLeadByte
LockResource
LoadResource
FormatMessageA
GetLastError
CreateProcessA
WaitForSingleObject
GetStartupInfoA
RemoveDirectoryA
FindNextFileA
ExitProcess
MulDiv
GetSystemDefaultLCID
GetModuleFileNameA
WritePrivateProfileSectionA
WritePrivateProfileStringA
GetPrivateProfileSectionA
GetShortPathNameA
MoveFileExA
lstrcatA
GetFileAttributesA
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
Sleep
GetDiskFreeSpaceA
FindFirstFileA
FindClose
lstrcpyA
lstrlenA
FindResourceA
CompareStringA
lstrcpynA
FlushFileBuffers
LCMapStringW
LCMapStringA
RtlUnwind
GetFileType
SetStdHandle
CloseHandle
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
WideCharToMultiByte
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetModuleHandleA
HeapFree
HeapAlloc
user32
SetWindowPos
SendMessageA
TranslateMessage
wsprintfA
GetWindowLongA
GetParent
SetWindowTextA
GetWindowTextA
GetWindow
SetDlgItemTextA
EndDialog
SendDlgItemMessageA
LoadStringA
CharNextA
DialogBoxParamA
IsCharAlphaA
CharNextExA
GetDesktopWindow
GetDlgItemTextA
KillTimer
EnableWindow
SetTimer
PostMessageA
SetFocus
CreateDialogParamA
DestroyWindow
GetDlgItem
GetDC
ReleaseDC
ScreenToClient
SetWindowLongA
CreateWindowExA
GetWindowRect
SystemParametersInfoA
MessageBeep
PeekMessageA
GetSysColor
GetClassNameA
MessageBoxA
DispatchMessageA
MapWindowPoints
GetClientRect
gdi32
CreateFontIndirectA
TextOutA
SetTextColor
SelectObject
SetBkMode
GetTextExtentPointA
GetDeviceCaps
GetObjectA
DeleteObject
comctl32
ord17
PropertySheetA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
lz32
LZOpenFileA
LZCopy
LZClose
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cronjff Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 279KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE