Behavioral task
behavioral1
Sample
5bbc01822c567bbdd163b7826deda155714fc42ce6be54b502d5fff732e733d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5bbc01822c567bbdd163b7826deda155714fc42ce6be54b502d5fff732e733d2.exe
Resource
win10v2004-20220812-en
General
-
Target
5bbc01822c567bbdd163b7826deda155714fc42ce6be54b502d5fff732e733d2
-
Size
189KB
-
MD5
819c29cc4b077c3e537d382972a45d97
-
SHA1
ade1a38dc5fdd905bc775f83f5da5fe3ff4a4ec3
-
SHA256
5bbc01822c567bbdd163b7826deda155714fc42ce6be54b502d5fff732e733d2
-
SHA512
9dfd6416a3180943d5e10416f33ae030119201113c260fcb6cc2a3d9e39e9785ee4bdb7bf5134cafaab33f154161b4a6895436209defed2aea350b0b8baf1ec7
-
SSDEEP
3072:ohl8dFGDEhExijty89bk6dWKDvzFYkzGptfenyFrcr8PmpnNsSHUcRSwD/gR/e7r:mqFTgijzGCvKtgHnqS0+ViWqZZw
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5bbc01822c567bbdd163b7826deda155714fc42ce6be54b502d5fff732e733d2.exe windows x86
f64e694edcc89bd089b646e9c543e6f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharUpperW
LoadStringW
wsprintfW
ole32
CoInitializeSecurity
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
oleaut32
VariantChangeType
VariantCopy
SysStringLen
SysAllocStringByteLen
VariantClear
SysFreeString
SysAllocString
VariantInit
framedyn
?Format@CHString@@QAAXPBGZZ
??0CHString@@QAE@PBG@Z
?Find@CHString@@QBEHPBG@Z
??4CHString@@QAEABV0@ABV0@@Z
?Mid@CHString@@QBE?AV1@H@Z
?Find@CHString@@QBEHG@Z
??0CHString@@QAE@XZ
?ReleaseBuffer@CHString@@QAEXH@Z
?GetBufferSetLength@CHString@@QAEPAGH@Z
?Left@CHString@@QBE?AV1@H@Z
?Compare@CHString@@QBEHPBG@Z
?Mid@CHString@@QBE?AV1@HH@Z
??4CHString@@QAEABV0@PBG@Z
?TrimRight@CHString@@QAEXXZ
?TrimLeft@CHString@@QAEXXZ
?FindOneOf@CHString@@QBEHPBG@Z
??YCHString@@QAEABV0@PBG@Z
?GetData@CHString@@IBEPAUCHStringData@@XZ
??1CHString@@QAE@XZ
secur32
GetUserNameExW
ws2_32
WSAGetLastError
inet_addr
gethostbyaddr
WSACleanup
WSAStartup
msvcrt
??1type_info@@UAE@XZ
_controlfp
?terminate@@YAXXZ
wcslen
wcscpy
_except_handler3
wcsstr
memmove
_itow
__CxxFrameHandler
??2@YAPAXI@Z
_iob
_CxxThrowException
??3@YAXPAX@Z
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
exit
_cexit
_XcptFilter
_exit
_c_exit
strtok
wcschr
fprintf
fflush
_wcsnicmp
wcsncmp
wcstol
wcstok
realloc
free
calloc
_wcsicmp
wcstod
kernel32
FreeLibrary
lstrlenW
lstrcmpiW
LocalAlloc
FormatMessageW
SetLastError
lstrcmpW
lstrcatW
InterlockedDecrement
GetConsoleScreenBufferInfo
GetModuleHandleA
GetComputerNameExW
GetTimeFormatW
GetConsoleMode
GetStdHandle
WriteConsoleW
SetConsoleCursorPosition
InterlockedIncrement
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetConsoleMode
ReadFile
ReadConsoleW
MultiByteToWideChar
GetLastError
LocalFree
LoadLibraryW
GetProcAddress
lstrcpyW
WideCharToMultiByte
VerSetConditionMask
VerifyVersionInfoW
FileTimeToSystemTime
lstrcpynW
SetUnhandledExceptionFilter
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 21B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE