Behavioral task
behavioral1
Sample
b680710c1f5738a306622b4f89084247c2c777b9bedd9f1aacf5a0fba3b3786a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b680710c1f5738a306622b4f89084247c2c777b9bedd9f1aacf5a0fba3b3786a.exe
Resource
win10v2004-20220812-en
General
-
Target
b680710c1f5738a306622b4f89084247c2c777b9bedd9f1aacf5a0fba3b3786a
-
Size
128KB
-
MD5
7b52ad63bdbef7ae9b5601fdc898374d
-
SHA1
e1f60990f2bf68f001d8a4b6e763266a37768e70
-
SHA256
b680710c1f5738a306622b4f89084247c2c777b9bedd9f1aacf5a0fba3b3786a
-
SHA512
1d8159594aaf889669caa7adce5116040b1a59f026c56aec3d99384e64b0b7d167fa25ccf5a7483b60e79fa2378c216208f28d4547a3d14ee2044655c5b2b2dd
-
SSDEEP
3072:Dm0p1NMyD2uL/89NU6HcO8/vzmxSZR/v1HgBZ1VCu3QRoxn:fp1iEgHcOm7mY/vGTB3Qix
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b680710c1f5738a306622b4f89084247c2c777b9bedd9f1aacf5a0fba3b3786a.exe windows x86
2cba462a5d8fb39f4a6a6cf6ef7a861a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfigW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
kernel32
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetEnvironmentStrings
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
GetModuleHandleA
GetProcAddress
ExitProcess
GetVersionExA
GetCommandLineA
GetStartupInfoA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetSystemDirectoryW
LocalFree
GetLastError
GetCPInfo
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE