Behavioral task
behavioral1
Sample
8f43527ef725999eb94719eea0149c391145242649e0fb0e97ac8e8a44ac08bb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f43527ef725999eb94719eea0149c391145242649e0fb0e97ac8e8a44ac08bb.exe
Resource
win10v2004-20220901-en
General
-
Target
8f43527ef725999eb94719eea0149c391145242649e0fb0e97ac8e8a44ac08bb
-
Size
122KB
-
MD5
2a56ba646b3016f9ca2b1b78cf3cad59
-
SHA1
27aa961eb0ea9b340be47d75558e11a2f9758ec3
-
SHA256
8f43527ef725999eb94719eea0149c391145242649e0fb0e97ac8e8a44ac08bb
-
SHA512
fb0ced46f089245e2a11f92dcae15c4c416c9f6436e7215938389923a876975598b8826fcd6786f55c1ee2f02aaa472859b4225b26eb16456d1e15bbd7a85b28
-
SSDEEP
3072:BKHjiTvkgVCkoASC7aboyvsd6hLPwvMxI0M4W8Opzc2kLBJMTV4:BKE8JkoKyvsd6hLEn0a8Opgf7MTV4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8f43527ef725999eb94719eea0149c391145242649e0fb0e97ac8e8a44ac08bb.exe windows x86
9420ebcb3df4a10fe54b20a468e139c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
kernel32
CloseHandle
GetLastError
CreateEventW
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
_cexit
??1type_info@@UAE@XZ
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_except_handler4_common
_controlfp
memset
__set_app_type
__CxxFrameHandler3
swprintf_s
??0exception@@QAE@XZ
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
__getmainargs
malloc
_callnewh
_CxxThrowException
free
??0exception@@QAE@ABV0@@Z
ole32
CoSetProxyBlanket
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CLSIDFromString
CoInitialize
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 722B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE