Behavioral task
behavioral1
Sample
5813277368128ef77d027778a367ecae1a8a468c500ed1d2f78292020e5d161c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5813277368128ef77d027778a367ecae1a8a468c500ed1d2f78292020e5d161c.exe
Resource
win10v2004-20220812-en
General
-
Target
5813277368128ef77d027778a367ecae1a8a468c500ed1d2f78292020e5d161c
-
Size
171KB
-
MD5
5e8cc08b57ae82d3c885e8bc0f977871
-
SHA1
275a605b52a85937d73c34416c40ca5e1a96b2b3
-
SHA256
5813277368128ef77d027778a367ecae1a8a468c500ed1d2f78292020e5d161c
-
SHA512
a3c35531ad975d9fc70fe0956422af815ee8c8f84c66c8f56ee2afed2e3392ca09b0a734b183cf60561bfd0b1529e87462d7736ce0ff7bf46b6f0873b417e6dc
-
SSDEEP
3072:rlosVTf9XNbiNGhU7gIWIHySPJjdKsdn6SCFMZxbkS8bK+uHRc0rZC7qRkoQHl:rlosRz2GhUdySPJBKhmZxL8hAbhRuF
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5813277368128ef77d027778a367ecae1a8a468c500ed1d2f78292020e5d161c.exe windows x86
ea3a01e7208bb2ef0ec746fe1ab028f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GlobalFree
GlobalAlloc
FindClose
FindFirstFileA
lstrcpynA
GetPrivateProfileStringA
Sleep
OutputDebugStringA
SetFileAttributesA
MoveFileExA
FindNextFileA
GetShortPathNameA
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
SetFilePointer
SetEndOfFile
GetWindowsDirectoryA
GetSystemDirectoryA
CreateDirectoryA
lstrcpyA
lstrcatA
lstrlenA
RemoveDirectoryA
GetCurrentProcess
TerminateProcess
HeapFree
GetVersionExA
MultiByteToWideChar
GetStringTypeA
LoadLibraryA
GetStringTypeW
WriteFile
RtlUnwind
GetProcAddress
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
GetLastError
GetFileAttributesA
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetFileType
VirtualFree
HeapCreate
WideCharToMultiByte
LCMapStringA
LCMapStringW
HeapDestroy
FreeEnvironmentStringsW
GetEnvironmentStrings
VirtualAlloc
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
user32
ExitWindowsEx
LoadIconA
MessageBoxA
LoadStringA
FindWindowA
wsprintfA
SendMessageA
advapi32
FreeSid
ControlService
DeleteService
CloseServiceHandle
RegEnumKeyExA
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenServiceA
OpenSCManagerA
EqualSid
AllocateAndInitializeSid
GetTokenInformation
RegSetValueExA
RegOpenKeyA
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiOpenDevRegKey
SetupDiCallClassInstaller
SetupDiDeleteDeviceInfo
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 831B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE