Behavioral task
behavioral1
Sample
8b6a3a9eeaeff39f06639e319689c1e00a6737802380f41c15674b06e6ae7132.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b6a3a9eeaeff39f06639e319689c1e00a6737802380f41c15674b06e6ae7132.exe
Resource
win10v2004-20220812-en
General
-
Target
8b6a3a9eeaeff39f06639e319689c1e00a6737802380f41c15674b06e6ae7132
-
Size
171KB
-
MD5
4f8e84619dd31952cbcd4fa1d4eca360
-
SHA1
e227db7fb38e5a67d4974cda9f93c57b87f4189c
-
SHA256
8b6a3a9eeaeff39f06639e319689c1e00a6737802380f41c15674b06e6ae7132
-
SHA512
c669c201cfcd084f80952faf00d09ec4a8e184f80df36ce5b9079268fbb88a55b8ec0f53666f38a4bfbabfb718644f58ac3eeafd0172357510b04dce3565b6c8
-
SSDEEP
3072:X2uneI8QBNjExT8sl3VX01c4TvzE9xTvodj3mHmSGRAl4Go8fEjnp7Zgw:NBNj08e3VX9qWvo12m3RAlGd7Zl
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8b6a3a9eeaeff39f06639e319689c1e00a6737802380f41c15674b06e6ae7132.exe windows x86
4a63f6965d5277752d094fdb65aa5aaa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
GetFullPathNameW
GetFileAttributesW
CreateDirectoryW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CloseHandle
WaitForSingleObjectEx
CreateEventW
SetEvent
RaiseException
SetLastError
GetSystemWindowsDirectoryW
HeapAlloc
HeapFree
GetProcessHeap
lstrlenW
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_resetstkoflw
wcsrchr
wcschr
ntdll
RtlNtStatusToDosError
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE