Behavioral task
behavioral1
Sample
21f2a14105911cf187198c24190d44e1712c07d6904dba6704ef8fbe6d154937.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
21f2a14105911cf187198c24190d44e1712c07d6904dba6704ef8fbe6d154937.exe
Resource
win10v2004-20220901-en
General
-
Target
21f2a14105911cf187198c24190d44e1712c07d6904dba6704ef8fbe6d154937
-
Size
445KB
-
MD5
40bb9446fab9ca7afd4602a858e053bb
-
SHA1
7e19965c44d377a81df26f73714ff90b5a462ef8
-
SHA256
21f2a14105911cf187198c24190d44e1712c07d6904dba6704ef8fbe6d154937
-
SHA512
9620cdd4a3cd184be3931d75c12979d09a3aaef4819f2ad49ec7b64714f917813277de0b2a625ba826afd3e4050d6247e98f0f59f73d90c7a9e11c1f6607d037
-
SSDEEP
6144:YrbJBXEG024AZWdWFJJm6BZlzIJRbM5uon0Ll:AbJBXZ4AE8V9ZZMi5d6
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
21f2a14105911cf187198c24190d44e1712c07d6904dba6704ef8fbe6d154937.exe windows x86
176d9d8ee1ff2b6409129ae829b3c7f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsA
GetLastError
SetEndOfFile
GetStdHandle
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
AllocConsole
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
DeleteFileA
GetProcAddress
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleFileNameA
CloseHandle
CreateProcessA
DuplicateHandle
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
GetDriveTypeA
GetFullPathNameA
SetStdHandle
GetFileType
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TerminateProcess
IsDebuggerPresent
Sleep
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
MultiByteToWideChar
ReadFile
HeapSize
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
GetFileAttributesA
CreatePipe
GetExitCodeProcess
WaitForSingleObject
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetCurrentDirectoryA
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
advapi32
GetUserNameA
Sections
.text Size: 221KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE