Behavioral task
behavioral1
Sample
6a244ede126def231b65cd7e4925db5469a940afe023de14404541f3d8b0643e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6a244ede126def231b65cd7e4925db5469a940afe023de14404541f3d8b0643e.exe
Resource
win10v2004-20220901-en
General
-
Target
6a244ede126def231b65cd7e4925db5469a940afe023de14404541f3d8b0643e
-
Size
136KB
-
MD5
96fd54ed8675374a9852ac64aef72a29
-
SHA1
6fbdeccf8f4677ea32648d3916732d5be4601ff1
-
SHA256
6a244ede126def231b65cd7e4925db5469a940afe023de14404541f3d8b0643e
-
SHA512
2a9b196519c46b081bcb41a96ebf537f04800165e5e2cdafb24494f4617e51ca697037ce01dc3d0f99b924c60a2f09e6dc4a592b0761dcae7efac5550d26206f
-
SSDEEP
3072:V9DEjf4v49bYANXL76l/wAmMAtZbo12Cn3Hq6:Vh8fjbm9mDo12CnX/
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6a244ede126def231b65cd7e4925db5469a940afe023de14404541f3d8b0643e.exe windows x86
26fa8febf8aa817f4de0c7b0b1a147fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__p__fmode
exit
_cexit
_XcptFilter
_exit
_c_exit
__set_app_type
_controlfp
_wcmdln
_except_handler3
malloc
free
realloc
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
advapi32
RegEnumValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
kernel32
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineW
SetUnhandledExceptionFilter
Sleep
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
lstrlenA
GetStartupInfoW
GetModuleFileNameW
FreeLibrary
GetProcAddress
LoadLibraryW
CreateThread
HeapDestroy
CreateEventW
GetCurrentThreadId
GetLastError
SetPriorityClass
GetCurrentProcess
GetVersionExW
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MultiByteToWideChar
lstrlenW
lstrcpyW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
lstrcpynW
SetEvent
CloseHandle
WaitForSingleObject
lstrcatW
user32
CharPrevW
GetMessageW
DispatchMessageW
PostThreadMessageW
CharNextW
ole32
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
LoadTypeLi
RegisterTypeLi
SysStringLen
VarUI4FromStr
SysFreeString
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE