Behavioral task
behavioral1
Sample
fc2d11dbc0d49629b89108c58875f12f0b8da78d7f68db090dcb15407bafb63b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc2d11dbc0d49629b89108c58875f12f0b8da78d7f68db090dcb15407bafb63b.exe
Resource
win10v2004-20220812-en
General
-
Target
fc2d11dbc0d49629b89108c58875f12f0b8da78d7f68db090dcb15407bafb63b
-
Size
139KB
-
MD5
a04476d0fdaa4ec36fa5bb5706769345
-
SHA1
18419e0b2f7eb7bfe9b414e8b18996580dd811e2
-
SHA256
fc2d11dbc0d49629b89108c58875f12f0b8da78d7f68db090dcb15407bafb63b
-
SHA512
b5f52805bcfd52a1925e97cbb602dd46e96408f73677eb551e9ab86d8c80d018fff9f9e396533ffa8c5095ffd2c7333c046a0c7ebd73cce78a630835ac31fff9
-
SSDEEP
3072:6TbnowYksF+CdPBzmSmOgUtEH9z8yiJ4xwNcBvEou5VCsL/4tze:6TcKsoEpzm9UX4xwNcBM6w
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fc2d11dbc0d49629b89108c58875f12f0b8da78d7f68db090dcb15407bafb63b.exe windows x86
02fbe41e9ce878071012635ed6d44df8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__fmode
__set_app_type
_except_handler3
__p__commode
_onexit
??1type_info@@UAE@XZ
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
__CxxFrameHandler
free
malloc
??0exception@@QAE@ABV0@@Z
_cexit
_XcptFilter
_exit
_c_exit
_CxxThrowException
__dllonexit
_errno
?terminate@@YAXXZ
_controlfp
msvcp60
?assign@?$char_traits@G@std@@SAXAAGABG@Z
?_Xlen@std@@YAXXZ
?_Xran@std@@YAXXZ
?length@?$char_traits@G@std@@SAIPBG@Z
?move@?$char_traits@G@std@@SAPAGPAGPBGI@Z
??0bad_alloc@std@@QAE@ABV01@@Z
??1bad_alloc@std@@UAE@XZ
??0bad_alloc@std@@QAE@PBD@Z
?find@?$char_traits@G@std@@SAPBGPBGIABG@Z
?compare@?$char_traits@G@std@@SAHPBG0I@Z
?assign@?$char_traits@G@std@@SAPAGPAGIABG@Z
?copy@?$char_traits@G@std@@SAPAGPAGPBGI@Z
kernel32
SetLastError
GetFileType
GetCurrentProcess
FreeLibrary
FormatMessageW
TlsAlloc
GetVersionExW
GetModuleFileNameW
GetFileAttributesExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileAttributesW
DeleteFileW
MoveFileW
FindFirstFileW
FindNextFileW
FindClose
DeleteCriticalSection
TlsFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
GetLocalTime
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemWindowsDirectoryW
CreateFileW
SetFilePointerEx
TlsGetValue
TlsSetValue
InitializeCriticalSection
WriteFile
GetLastError
OutputDebugStringW
CreateMutexW
LocalFree
CreateProcessW
GetSystemDirectoryW
SetUnhandledExceptionFilter
SetErrorMode
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
LoadLibraryExW
activeds
ord3
netapi32
DsRoleGetPrimaryDomainInformation
I_NetPathType
DsRoleFreeMemory
ntdll
wcstol
ole32
CoInitialize
CoUninitialize
oleaut32
VariantInit
SysAllocString
SysFreeString
VariantClear
user32
LoadStringW
GetDesktopWindow
MessageBoxW
advapi32
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE