Behavioral task
behavioral1
Sample
8b31377840a4494fe481f3248e09b517c69b0f710bcac1195743d984c5665e1a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8b31377840a4494fe481f3248e09b517c69b0f710bcac1195743d984c5665e1a.exe
Resource
win10v2004-20220901-en
General
-
Target
8b31377840a4494fe481f3248e09b517c69b0f710bcac1195743d984c5665e1a
-
Size
133KB
-
MD5
729ee8a5b13ab553681626d77788bff2
-
SHA1
f1cd72a657e49de197efe6ca5f6184e19d79d15f
-
SHA256
8b31377840a4494fe481f3248e09b517c69b0f710bcac1195743d984c5665e1a
-
SHA512
5cbca5344388e1a88f1f7eb80a4a706a6f09275d79ec1faebda5e42034f74fe81b1008aac63404ef81b30dd10135419515c12ff0dcdd694fe860c6ca21493651
-
SSDEEP
3072:l4O/JurLm+nhy5nMns3XbNuU7DKGUOG04GYtECANmq:6O/Jgu3LNp2Gv4GYtL2
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8b31377840a4494fe481f3248e09b517c69b0f710bcac1195743d984c5665e1a.exe windows x86
c4fb66b86b2910c3ef5cd0a7ac84ba8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
_purecall
_c_exit
_exit
_XcptFilter
_cexit
exit
__initenv
wcscpy
_initterm
__setusermatherr
??3@YAXPAX@Z
wcsncpy
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
wcscmp
_beginthreadex
wcslen
wcsstr
__getmainargs
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
??2@YAPAXI@Z
advapi32
InitializeAcl
AddAce
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
ImpersonateLoggedOnUser
RevertToSelf
GetTokenInformation
GetLengthSid
CopySid
CreateProcessAsUserW
OpenProcessToken
LogonUserW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
kernel32
GetSystemDirectoryW
lstrlenW
TerminateProcess
GetConsoleMode
CreateProcessW
ReadConsoleOutputW
WriteConsoleInputW
CreateFileW
GetConsoleScreenBufferInfo
GetExitCodeProcess
SetConsoleCtrlHandler
DuplicateHandle
GetCurrentProcess
HeapFree
HeapAlloc
GetLastError
GetProcessHeap
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LocalFree
DeviceIoControl
GenerateConsoleCtrlEvent
ExitProcess
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
WaitForSingleObject
SetEvent
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjects
InterlockedExchange
CreateEventW
GetTickCount
ResetEvent
Sleep
SetLastError
LocalAlloc
SetConsoleScreenBufferSize
GetLargestConsoleWindowSize
SetConsoleWindowInfo
user32
GetProcessWindowStation
CreateWindowStationW
SetUserObjectSecurity
CreateDesktopW
SetProcessWindowStation
CloseDesktop
VkKeyScanW
MapVirtualKeyW
wsprintfW
CloseWindowStation
ntdll
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlCreateUnicodeString
RtlFindMessage
shlwapi
wnsprintfW
userenv
DestroyEnvironmentBlock
UnloadUserProfile
CreateEnvironmentBlock
LoadUserProfileW
secur32
GetUserNameExW
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE