Behavioral task
behavioral1
Sample
7d29505ff7c4949a7ac957574ad496ca0c4e53ce0f86694fb061f09723d9d44e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d29505ff7c4949a7ac957574ad496ca0c4e53ce0f86694fb061f09723d9d44e.exe
Resource
win10v2004-20220901-en
General
-
Target
7d29505ff7c4949a7ac957574ad496ca0c4e53ce0f86694fb061f09723d9d44e
-
Size
61KB
-
MD5
a09bc25b75d7a324b7841136838afb9f
-
SHA1
69fa56b2b083e05da2720d846d02ed03f9985e32
-
SHA256
7d29505ff7c4949a7ac957574ad496ca0c4e53ce0f86694fb061f09723d9d44e
-
SHA512
4dc110514c9cd7365b89fe5169ed8567f2a82bb947f8eac1a143821ac284eb9da42d9454a7d4dc2c81823c310bbac647a9f6b8896dda10eb4f0831ea5c9f327a
-
SSDEEP
768:M5ECCsRDJ6dsDQVO8hMbCHGPcMf8RBb3T0OaOtVqL1JBGClBh4gE7:ECW4VOvC+cTZaOrqL1J0iBh4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7d29505ff7c4949a7ac957574ad496ca0c4e53ce0f86694fb061f09723d9d44e.exe windows x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE