Behavioral task
behavioral1
Sample
b55355347a4ade877a060954d982e7023e87775e52357adb15ff32cd0e0679b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b55355347a4ade877a060954d982e7023e87775e52357adb15ff32cd0e0679b2.exe
Resource
win10v2004-20220812-en
General
-
Target
b55355347a4ade877a060954d982e7023e87775e52357adb15ff32cd0e0679b2
-
Size
137KB
-
MD5
817743f9597d7c16dcfe276bed5cbc30
-
SHA1
1efd957672f2f01df5c9eb26084d4ba28981216a
-
SHA256
b55355347a4ade877a060954d982e7023e87775e52357adb15ff32cd0e0679b2
-
SHA512
c9303a12e8572231efeb3f84084f013cff43a7f7997e49248e261f74d38d22a3037bc550acea19ee1440188dbec51f489f2283f7e99eca09511ea591d34b3f64
-
SSDEEP
3072:9SiHHP2/bsv6NC3o8ynUytNjUIXqBQkmTn2XRFyepZ47GUQTWIg:9lHYbmLGUyn4B3TXRES47GbTWIg
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b55355347a4ade877a060954d982e7023e87775e52357adb15ff32cd0e0679b2.exe windows x86
a2888c1c669df960fa9bf31a11ecc7ab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
TraceMessage
kernel32
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
InterlockedDecrement
InterlockedIncrement
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersion
GetLastError
WaitForSingleObject
CreateEventW
CreateProcessW
SetEvent
CompareStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
HeapDestroy
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
user32
SendMessageW
FindWindowW
UnregisterClassA
msvcrt
_ismbblead
??3@YAXPAX@Z
memset
_vsnwprintf
memcpy_s
_CxxThrowException
_wcsicmp
_vscwprintf
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_controlfp
_XcptFilter
_exit
_cexit
__getmainargs
free
??_U@YAPAXI@Z
??_V@YAXPAX@Z
wcschr
??2@YAPAXI@Z
__CxxFrameHandler3
wcstok
memmove_s
vswprintf_s
oleaut32
SysAllocString
SysFreeString
shlwapi
StrRStrIW
ole32
CreateBindCtx
CoRegisterClassObject
CLSIDFromString
CoUninitialize
CoInitializeEx
CoCreateInstance
CoRevokeClassObject
setupapi
SetupDiOpenDevRegKey
SetupDiOpenDeviceInterfaceW
SetupDiGetClassDevsExW
SetupDiGetDeviceInterfaceAlias
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
shell32
ord155
ShellExecuteExW
SHParseDisplayName
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE