Behavioral task
behavioral1
Sample
8656d1546d7ae335a0a54f9123d1c16cff50658192d80a17c892ccbb5ef73502.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8656d1546d7ae335a0a54f9123d1c16cff50658192d80a17c892ccbb5ef73502.exe
Resource
win10v2004-20220812-en
General
-
Target
8656d1546d7ae335a0a54f9123d1c16cff50658192d80a17c892ccbb5ef73502
-
Size
157KB
-
MD5
487ff029a75d5913bfce5c3d9336498c
-
SHA1
b1a4fedc36525972601762c5d60047218186fb02
-
SHA256
8656d1546d7ae335a0a54f9123d1c16cff50658192d80a17c892ccbb5ef73502
-
SHA512
a7a4285e30efce6e8ec6faf35ac91f7dd254eed57205033299d450c3cdd141a407337be55f87c6f79284b51590e8813022abefa15e3116e4e09a9fb4ecbecabc
-
SSDEEP
3072:KdYpmc9hxeI0WWvTNwKRmxPwhhkzgccTVJCkc6O4HMD/ytA2idHOrQhS:KdYvsI0pTNwKRWwhhnccTVJClV4HMr9o
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8656d1546d7ae335a0a54f9123d1c16cff50658192d80a17c892ccbb5ef73502.exe windows x86
91ec832ac4951cd03c383d283c59899c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
kernel32
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetUserDefaultUILanguage
GetLocaleInfoW
CreateProcessW
GetProcessHeap
HeapFree
HeapAlloc
LoadLibraryExW
GetStartupInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetLastError
CreateMutexW
CloseHandle
FormatMessageW
CreateEventW
GetCurrentProcessId
user32
PeekMessageW
DispatchMessageW
MsgWaitForMultipleObjects
RegisterWindowMessageW
LoadStringW
LoadImageW
PostQuitMessage
PostMessageW
DestroyMenu
TrackPopupMenu
SetMenuDefaultItem
SetMenuItemInfoW
AppendMenuW
CreatePopupMenu
SetForegroundWindow
GetCursorPos
DefWindowProcW
CreateWindowExW
LoadCursorW
LoadIconW
ShowWindow
RegisterClassExW
shell32
SHGetFolderPathW
ShellExecuteW
Shell_NotifyIconW
rpcrt4
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcBindingFree
RpcSsDestroyClientContext
NdrClientCall2
RpcStringFreeW
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE