Behavioral task
behavioral1
Sample
dcf2770cfb39ec34d0add947bd5dfa56bba5e40f3c813d510e3e76e84268c120.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcf2770cfb39ec34d0add947bd5dfa56bba5e40f3c813d510e3e76e84268c120.exe
Resource
win10v2004-20220901-en
General
-
Target
dcf2770cfb39ec34d0add947bd5dfa56bba5e40f3c813d510e3e76e84268c120
-
Size
104KB
-
MD5
80ce75c04dfb3ff6a65050ec95c5dfe8
-
SHA1
9543a249e0f03a45a5e5e2d191637474cefcec20
-
SHA256
dcf2770cfb39ec34d0add947bd5dfa56bba5e40f3c813d510e3e76e84268c120
-
SHA512
1c654916de427186409146dff4641e77162ed146eb6dea9cf187a27f83e7e1069b288273f7c18a0458f9fd71147824d4c6597f77f9a79553156c5df5ec90c09a
-
SSDEEP
3072:VCcq5OAFXFX7PsOjR2eBdObGSy8iMxwFj1:Lq5OM1djRn+SKKj
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dcf2770cfb39ec34d0add947bd5dfa56bba5e40f3c813d510e3e76e84268c120.exe windows x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 54KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE