Behavioral task
behavioral1
Sample
6c93c3270edffe75762388e02deb1fb0a7b4dbd87ca06a523600fbb3d95e6afb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c93c3270edffe75762388e02deb1fb0a7b4dbd87ca06a523600fbb3d95e6afb.exe
Resource
win10v2004-20220812-en
General
-
Target
6c93c3270edffe75762388e02deb1fb0a7b4dbd87ca06a523600fbb3d95e6afb
-
Size
125KB
-
MD5
40dbc876dacb6b4651b68d275720cd2f
-
SHA1
469372dceb9b9c8b5ea43cbcfb474f23f95f550f
-
SHA256
6c93c3270edffe75762388e02deb1fb0a7b4dbd87ca06a523600fbb3d95e6afb
-
SHA512
43c55e2af56faa4cf253332f04fa1ce9fccb6ed31e1759c7808278455d92c3b806988e52274694aa2b57bc520ea24d884dedabc4aea40d995b4de53137a3aa4f
-
SSDEEP
3072:eAsFIYRNI6zcs8I2labEphfBY4yL7bPAM:eAUR66znTbEphf24e7cM
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6c93c3270edffe75762388e02deb1fb0a7b4dbd87ca06a523600fbb3d95e6afb.exe windows x86
a5def2a918d660e1a18c57e4b43e20a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_c_exit
__p__commode
__p__fmode
_vsnwprintf
__set_app_type
_controlfp
_except_handler3
??2@YAPAXI@Z
_adjust_fdiv
??3@YAXPAX@Z
kernel32
EnterCriticalSection
LoadLibraryExA
SetEvent
GetTempFileNameW
GetTickCount
GetTempPathW
UnmapViewOfFile
GetModuleHandleW
CloseHandle
CreateProcessW
GetModuleFileNameW
GetLastError
GlobalFree
CreateFileW
MapViewOfFile
GetCommandLineW
SetUnhandledExceptionFilter
InitializeCriticalSection
CreateFileMappingW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetStartupInfoA
GetProcAddress
GetWindowsDirectoryW
lstrcpynW
LoadLibraryW
LeaveCriticalSection
LocalFree
DeleteCriticalSection
SetLastError
gdi32
GetObjectW
SetTextColor
SetBkMode
CreatePen
SelectObject
Polyline
DeleteObject
CreateFontIndirectW
user32
GetParent
DialogBoxParamW
SendMessageW
LoadStringW
SetDlgItemTextW
GetSysColor
DrawIconEx
FillRect
GetSysColorBrush
SetWindowTextW
EnableWindow
GetDlgItem
MessageBoxW
SetWindowLongW
GetWindowLongW
EndDialog
ShowWindow
SetWindowPos
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
PathQuoteSpacesW
StrCmpW
StrToIntW
ord414
shell32
ExtractIconExW
CommandLineToArgvW
dbghelp
MiniDumpReadDumpStream
MiniDumpWriteDump
oleaut32
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shdocvw
ord159
sfc
SfcIsFileProtected
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE