Behavioral task
behavioral1
Sample
f08ed16064be078767cfeaa10bf18e2ba58123c7ca336409e0de40584b70d930.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f08ed16064be078767cfeaa10bf18e2ba58123c7ca336409e0de40584b70d930.exe
Resource
win10v2004-20220812-en
General
-
Target
f08ed16064be078767cfeaa10bf18e2ba58123c7ca336409e0de40584b70d930
-
Size
172KB
-
MD5
a041509795fd0e799093081e17b2b39b
-
SHA1
bd623f9d1a66bfbc2eb4b4caff385700c29c85b0
-
SHA256
f08ed16064be078767cfeaa10bf18e2ba58123c7ca336409e0de40584b70d930
-
SHA512
ba43a4dc8fb97aab75622fae34c7b81935999e853a200b250aa53991e4e8fcb1c1226128b029e0535231f444b8e27643b148e4c2fc000a97c8ff120033ffed7d
-
SSDEEP
3072:uUxVxQDgpPBn20Uooful4VI7X0Vv/y458T9xouYQzp9JVVdf9oskg4sqzV1d:9DvPBRofuoIr0U4CZa8HSsqzB
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f08ed16064be078767cfeaa10bf18e2ba58123c7ca336409e0de40584b70d930.exe windows x86
349dce3c166e627d88a97c190f96a060
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
CreateThread
SetThreadPriority
CreateEventA
CreateProcessA
GetSystemDirectoryA
WritePrivateProfileStringA
GetExitCodeProcess
GetUserDefaultLCID
ExitThread
WaitForSingleObject
lstrcpyA
lstrlenA
GetCurrentProcess
FindResourceA
LoadResource
LockResource
FreeResource
LoadLibraryA
GetProcAddress
FreeLibrary
FormatMessageA
lstrcmpiA
GetModuleFileNameA
CreateMutexA
GetLastError
OpenEventA
SetEvent
CloseHandle
GetWindowsDirectoryA
GetPrivateProfileStringA
GetShortPathNameA
lstrcatA
GetFileAttributesA
GetVersionExA
WriteFile
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
LCMapStringW
FreeEnvironmentStringsA
MultiByteToWideChar
RtlUnwind
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
LocalFree
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
WideCharToMultiByte
GetFileType
GetStdHandle
SetHandleCount
HeapSize
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
TerminateProcess
ExitProcess
HeapReAlloc
HeapAlloc
HeapFree
SetFilePointer
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
SetStdHandle
VirtualAlloc
GetStringTypeW
user32
BeginPaint
SendMessageA
EndPaint
DefWindowProcA
PostQuitMessage
SetCapture
UpdateWindow
ShowWindow
SetWindowPos
GetClientRect
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
PostMessageA
GetClassNameA
ReleaseCapture
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
EnumWindows
GetDlgItem
ExitWindowsEx
GetSystemMetrics
MoveWindow
PostThreadMessageA
ReleaseDC
wsprintfA
DialogBoxParamA
GetWindowTextA
SetWindowTextA
CreateDialogParamA
GetWindowRect
ScreenToClient
IsDlgButtonChecked
SetCursor
DestroyWindow
MessageBoxA
EndDialog
GetDC
EnumChildWindows
FindWindowA
gdi32
CreateDIBitmap
SelectPalette
RealizePalette
CreatePalette
DeleteDC
SelectObject
CreateCompatibleDC
StretchBlt
GetObjectA
CreateFontIndirectA
GetTextExtentPoint32A
DPtoLP
GetDeviceCaps
CreateHalftonePalette
DeleteObject
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
hpfinst
_ProcessExpandStringEx@20
_InitProcessStrings@0
_InitProcess@8
_SetProcessString@8
_ProcessExpandString@16
_Process@8
_DeInitProcess@12
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE