Behavioral task
behavioral1
Sample
b6fc44e3d12368778c4cc675373c6e7d0e6183d852b7288588f2c03504b18e5e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6fc44e3d12368778c4cc675373c6e7d0e6183d852b7288588f2c03504b18e5e.exe
Resource
win10v2004-20220812-en
General
-
Target
b6fc44e3d12368778c4cc675373c6e7d0e6183d852b7288588f2c03504b18e5e
-
Size
250KB
-
MD5
802e6abedb85ea6c2f8b309f3ce70370
-
SHA1
785eed906153a0478cb8f5540bb783160f982a60
-
SHA256
b6fc44e3d12368778c4cc675373c6e7d0e6183d852b7288588f2c03504b18e5e
-
SHA512
bab96a471246e3584b6ca68160bc230c8b7845a0067dcc2f2a6159da568c2e2bf91da4cbeef7daee2d8ee092688116134db8420bdd153eb5ffbfaba7a60ec0b1
-
SSDEEP
6144:R+BclRDvO4SIA1AT+UBiPVCi55bdbP9GwCUKMCux:gCbDvJAmTs9C+hGaCk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b6fc44e3d12368778c4cc675373c6e7d0e6183d852b7288588f2c03504b18e5e.exe windows x86
9075197d6d027ae1ac5deb25f9cd953d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
arkshell
arkRegisterCallback
arkEndApp
arkStartApp
arkmodule
arkModuleRequire
kernel32
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
HeapAlloc
InitializeCriticalSection
SetUnhandledExceptionFilter
CloseHandle
EnterCriticalSection
GetCurrentProcessId
VirtualAllocEx
WriteProcessMemory
GetCurrentProcess
CreateEventW
SearchPathW
WaitForSingleObject
TerminateProcess
GetModuleFileNameW
GetModuleHandleW
GetProcessHeap
SetErrorMode
GetProcAddress
GetCurrentThreadId
CreateProcessW
DuplicateHandle
WideCharToMultiByte
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
WaitMessage
PeekMessageW
DispatchMessageW
TranslateMessage
msvcr80
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_exit
_cexit
__wgetmainargs
_amsg_exit
??_U@YAPAXI@Z
??_V@YAXPAX@Z
__CxxFrameHandler3
memset
wcslen
_snwprintf
memcpy
_XcptFilter
msvcp80
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find_last_of@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
??$?H_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@ABV10@PB_W@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??A?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAA_WI@Z
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE