Behavioral task
behavioral1
Sample
3ca49f0a226a4c1f527df6ace6e8be2358c59066776f815e9f6affab34896774.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ca49f0a226a4c1f527df6ace6e8be2358c59066776f815e9f6affab34896774.exe
Resource
win10v2004-20220901-en
General
-
Target
3ca49f0a226a4c1f527df6ace6e8be2358c59066776f815e9f6affab34896774
-
Size
239KB
-
MD5
a08de8fa978502fe125b9604abce279a
-
SHA1
06499424350dd515f6c0538eca4e406bb4599b23
-
SHA256
3ca49f0a226a4c1f527df6ace6e8be2358c59066776f815e9f6affab34896774
-
SHA512
6c72cb0c650c0ee9e1865f9bc5ef83ce7d38c43b785901b61d7f6b798c0bce49fe5eb3d279c8d0580e992c579e39c125b456823286e3b82932c5ad4095a07a9c
-
SSDEEP
3072:Ah18piPG8fnhqMrTwpM01aKPJkoQLZ73qJuBFpqrw:K18cPG8fnhXWdbQL5KGP
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3ca49f0a226a4c1f527df6ace6e8be2358c59066776f815e9f6affab34896774.exe windows x86
0d0017b9d377ac58fc7a078bbb02430c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcscpy
wcslen
__CxxFrameHandler
_CxxThrowException
_vsnwprintf
free
_controlfp
??1type_info@@UAE@XZ
??2@YAPAXI@Z
??3@YAXPAX@Z
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_onexit
?terminate@@YAXXZ
_vsnprintf
wcsftime
localtime
time
iswalpha
towupper
swscanf
iswdigit
wcsncat
malloc
wcsncpy
srand
rand
wprintf
realloc
wcscmp
wcscat
wcschr
setlocale
_wcsicmp
_purecall
atl
ord30
advapi32
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
RegOpenKeyExW
RegQueryValueExW
OpenThreadToken
ConvertSidToStringSidW
LookupAccountSidW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegCloseKey
kernel32
DeviceIoControl
GetCurrentThread
UnlockFileEx
FlushFileBuffers
CreateFileW
LockFileEx
GetFileSizeEx
SetFilePointerEx
OutputDebugStringW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetThreadUILanguage
GetCurrentProcessId
GetCurrentThreadId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FileTimeToLocalFileTime
ResetEvent
CreateEventW
GetVolumePathNameW
GetSystemWindowsDirectoryW
GetVersionExW
CloseHandle
GetLastError
SetLastError
GetCurrentProcess
GetStdHandle
GetCommandLineW
FindVolumeClose
Sleep
FindNextVolumeW
GetDriveTypeW
FindFirstVolumeW
GetTickCount
QueryPerformanceCounter
GetVolumeNameForVolumeMountPointW
WriteFile
WideCharToMultiByte
GetConsoleOutputCP
WriteConsoleW
GetConsoleMode
GetFileType
LocalFree
FreeLibrary
LoadLibraryExW
FormatMessageW
GetTimeFormatW
GetDateFormatW
GetThreadLocale
FileTimeToSystemTime
CompareStringW
SystemTimeToFileTime
GetSystemTime
ReadConsoleW
FlushConsoleInputBuffer
SetConsoleMode
GetModuleHandleW
GetSystemTimeAsFileTime
ole32
CoTaskMemRealloc
CoInitializeEx
CoTaskMemFree
CoUninitialize
CLSIDFromString
CoTaskMemAlloc
CoInitializeSecurity
CoCreateInstance
user32
LoadStringW
oleaut32
SysFreeString
vssapi
ord6
ord7
?CreateVssBackupComponents@@YGJPAPAVIVssBackupComponents@@@Z
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE