Behavioral task
behavioral1
Sample
63683779e27c43e2de5f78d64a348202d83282180c5a4deb27118536a8f08e9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63683779e27c43e2de5f78d64a348202d83282180c5a4deb27118536a8f08e9a.exe
Resource
win10v2004-20220812-en
General
-
Target
63683779e27c43e2de5f78d64a348202d83282180c5a4deb27118536a8f08e9a
-
Size
180KB
-
MD5
7347476119a4e7eedd4e1dc580513a9e
-
SHA1
0c1f196796c065fd2fd80cdf69d676000c696fb3
-
SHA256
63683779e27c43e2de5f78d64a348202d83282180c5a4deb27118536a8f08e9a
-
SHA512
4bb88f74be6708d07e72a99282de319c5cd6537a5fcd41057117645326d60a1484a7a0e85904d350483b95ae4c4001859b3deb318557b73092d3e1d6d6849a44
-
SSDEEP
3072:I97KWtgbLNucwnxmc90/WJKosJWO3e5QgS0xYjChRFJF2Ft/yfhy7FOph6P:IVNybLN4dsJWO3e5VxGChRF72jypy7F3
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
63683779e27c43e2de5f78d64a348202d83282180c5a4deb27118536a8f08e9a.exe windows x86
ef0cc36c4d5ae13efd6b48e15140f072
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
lstrlenW
GetCurrentThread
GetCurrentProcess
CloseHandle
GetLastError
EnterCriticalSection
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
IsBadCodePtr
IsBadReadPtr
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
lstrlenA
GetCommandLineA
lstrcmpiA
GetCurrentThreadId
InterlockedDecrement
RtlUnwind
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TerminateProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
WriteFile
SetFilePointer
SetUnhandledExceptionFilter
user32
LoadStringA
CharNextA
PostThreadMessageA
DispatchMessageA
MessageBoxA
GetMessageA
advapi32
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenSCManagerA
GetTokenInformation
OpenThreadToken
OpenProcessToken
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
StartServiceCtrlDispatcherA
ControlService
DeleteService
CloseServiceHandle
OpenServiceA
CreateServiceA
ole32
CoUninitialize
CoInitializeSecurity
CoInitialize
oleaut32
SysStringLen
SysFreeString
LoadRegTypeLi
atl
ord20
ord17
ord18
ord57
ord16
ord32
ord58
ord30
ord23
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE