Behavioral task
behavioral1
Sample
4ca944c8f84983a763aabdb495a5b788f39204c9ed360165690b955815784aa8.exe
Resource
win7-20220901-en
General
-
Target
4ca944c8f84983a763aabdb495a5b788f39204c9ed360165690b955815784aa8
-
Size
864KB
-
MD5
51b6f46677162207f9678895170f4a4f
-
SHA1
1b1f5240c49d48d8b998617bf96ec48057bb86a4
-
SHA256
4ca944c8f84983a763aabdb495a5b788f39204c9ed360165690b955815784aa8
-
SHA512
9f5be19e8f4b4754295ede9a7f6603f321e0c4c61855b242c703c7439bd9fc2a4a6fb5d1d9459824b142b3f446dc59d351468b2acfba12e73b0eda5d3476e8d3
-
SSDEEP
24576:dmBobqQTa8GCmKfrGzceFW1Lb7BAUCAJDOj7:EBobqQTaNCVfrGzceM1LblAUC5v
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4ca944c8f84983a763aabdb495a5b788f39204c9ed360165690b955815784aa8.exe windows x86
442bbdba5bbfd548ed21712bef11e695
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
NdrPointerBufferSize
NdrPointerMarshall
NdrPointerFree
NdrServerInitializeNew
NdrConvert
NdrConformantStringUnmarshall
RpcRaiseException
I_RpcGetBuffer
RpcMgmtStopServerListening
RpcServerUnregisterIf
RpcServerUseProtseqEpA
RpcServerRegisterIf
RpcServerListen
kernel32
LocalFree
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
GetModuleHandleA
Sleep
CreateProcessA
GetDiskFreeSpaceA
CreateFileA
QueryPerformanceFrequency
CreateEventA
SetFilePointer
lstrcmpiA
ReadFile
FindNextFileA
lstrcmpA
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileSize
GetFileTime
CompareStringA
CompareStringW
GetVersionExA
WriteFile
LocalFileTimeToFileTime
DosDateTimeToFileTime
LoadLibraryExA
SearchPathA
FreeLibrary
WaitForSingleObject
LoadLibraryA
GetVersion
GetWindowsDirectoryA
GetTempPathA
GetTickCount
SetEvent
GetCurrentProcess
GetShortPathNameA
GetSystemDirectoryA
WinExec
SetFileTime
SetFileAttributesA
InterlockedIncrement
MoveFileExA
IsBadWritePtr
IsBadReadPtr
GetPrivateProfileSectionNamesA
WritePrivateProfileSectionA
WritePrivateProfileStringA
RemoveDirectoryA
GlobalFree
GlobalUnlock
GlobalAlloc
GlobalLock
GetFileAttributesA
lstrcpynA
GetCurrentThreadId
GetCommandLineA
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcatA
CreateFileW
GetLocaleInfoA
LockResource
LoadResource
FindResourceA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
UnhandledExceptionFilter
HeapSize
HeapReAlloc
GetOEMCP
GetACP
FormatMessageA
MultiByteToWideChar
SetLastError
GetPrivateProfileSectionA
GetModuleFileNameA
lstrcpyA
GetPrivateProfileStringA
lstrlenA
GetLastError
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
OpenEventA
MoveFileA
CopyFileA
ResetEvent
CloseHandle
DeleteFileA
CreateDirectoryA
FindFirstFileA
FindClose
SetStdHandle
FlushFileBuffers
GetCPInfo
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
TlsGetValue
TlsAlloc
ExitProcess
GetStartupInfoA
HeapFree
HeapAlloc
ExitThread
TlsSetValue
RaiseException
RtlUnwind
TerminateProcess
QueryPerformanceCounter
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
VirtualProtect
VirtualQuery
GetLocalTime
GetCurrentThread
InterlockedExchange
CreateThread
user32
SendMessageA
SetDlgItemTextA
GetDlgItem
IsDialogMessageA
DestroyWindow
PeekMessageA
MsgWaitForMultipleObjects
CreateDialogIndirectParamA
CharNextA
LoadStringA
ExitWindowsEx
GetMessageA
TranslateMessage
DispatchMessageA
PostThreadMessageA
GetDesktopWindow
CharUpperA
WaitForInputIdle
wsprintfA
MessageBoxA
CharLowerBuffA
gdi32
TranslateCharsetInfo
CreateFontIndirectA
DeleteObject
GetObjectA
advapi32
RegQueryValueA
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegQueryValueExA
RegEnumValueA
RegEnumKeyExA
RegConnectRegistryA
RegDeleteValueA
RegQueryInfoKeyA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
GetFileSecurityA
IsValidSecurityDescriptor
SetFileSecurityA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
StgCreateDocfile
StgOpenStorage
CoLoadLibrary
GetRunningObjectTable
CreateItemMoniker
CoTaskMemFree
StringFromCLSID
CoCreateGuid
CoUninitialize
CoInitialize
CoGetInterfaceAndReleaseStream
CoCreateInstance
ProgIDFromCLSID
WriteClassStm
OleSaveToStream
OleLoadFromStream
CreateStreamOnHGlobal
CoRegisterClassObject
CoRevokeClassObject
CLSIDFromString
CreateFileMoniker
CoReleaseMarshalData
CoMarshalInterface
CoUnmarshalInterface
CoMarshalInterThreadInterfaceInStream
oleaut32
GetErrorInfo
SysFreeString
SysAllocString
VariantClear
SysAllocStringLen
SysStringLen
VariantChangeType
SysReAllocStringLen
LoadRegTypeLi
VariantInit
VariantCopy
SafeArrayPutElement
SafeArrayDestroy
SafeArrayGetElement
SafeArrayCreate
RegisterTypeLi
LoadTypeLi
SafeArrayCopy
SysStringByteLen
SysAllocStringByteLen
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
VariantCopyInd
SetErrorInfo
CreateErrorInfo
msi
ord49
ord160
ord117
ord159
ord73
ord146
ord112
ord103
ord31
ord79
ord116
ord75
ord124
ord17
ord87
ord189
ord18
ord46
ord33
ord136
ord144
ord141
ord168
ord7
ord67
ord93
ord91
ord95
ord8
ord120
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 500KB - Virtual size: 496KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE