Behavioral task
behavioral1
Sample
26da88ef4ba84cfa0b26af211696beb4443a587a55228f9ff0f7a18362918563.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
26da88ef4ba84cfa0b26af211696beb4443a587a55228f9ff0f7a18362918563.exe
Resource
win10v2004-20220812-en
General
-
Target
26da88ef4ba84cfa0b26af211696beb4443a587a55228f9ff0f7a18362918563
-
Size
192KB
-
MD5
5b7edd5fa29b08fe50da1487772564ee
-
SHA1
ba7613cf4a1a6f376512d7ea09229de6671fbe42
-
SHA256
26da88ef4ba84cfa0b26af211696beb4443a587a55228f9ff0f7a18362918563
-
SHA512
000be949edfd1de8517e14621537fd09446252a319d4e8d32b00edfc0ddb681ce84489fcccb9abd18762b734b49422078799e3afb19f08d8e69c650123432375
-
SSDEEP
3072:82YTZwzlGPRtKt49ECkDPpDQc/skGN8rpJSttKX4K31U:8L9wzly34bZX/skGN8N3Z31U
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
26da88ef4ba84cfa0b26af211696beb4443a587a55228f9ff0f7a18362918563.exe windows x86
589c7a8fba84ba5c2227510e5f8bc985
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
CloseHandle
DeleteCriticalSection
GetCurrentThreadId
Sleep
CreateSemaphoreW
GetLastError
CreateMutexW
CreateThread
OpenEventW
OpenMutexW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetModuleHandleA
ExitProcess
RaiseException
LoadLibraryA
FreeLibrary
GetProcAddress
LocalAlloc
WinExec
InterlockedExchange
WaitForSingleObject
SetEvent
EnterCriticalSection
ResetEvent
LeaveCriticalSection
CreateEventW
GetSystemTimeAsFileTime
InitializeCriticalSection
user32
FindWindowW
CreateWindowExW
DdeUninitialize
DdeFreeStringHandle
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
SetTimer
ShowWindow
BringWindowToTop
LoadCursorW
RegisterClassExW
PostMessageW
DdeInitializeW
DdeCreateStringHandleW
DdeConnect
DdeClientTransaction
DdeFreeDataHandle
KillTimer
DestroyWindow
DefWindowProcW
PostQuitMessage
GetWindowLongW
EnumWindows
IsWindow
coredll
?mfCreateProcess@@YAHPBG0PAU_SECURITY_ATTRIBUTES@@1HKPAX0PAU_STARTUPINFOW@@PAU_PROCESS_INFORMATION@@@Z
?mfStrJoin@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@ABV12@0@Z
?mfOsGetMutexName@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@ABV12@@Z
?ValueTStr@settings@core@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@ABV34@@Z
?Exists@settings@core@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@@Z
?mfOSIsVersionAtLeast@@YA_NW4meVersion@@I@Z
?LogAssertFailure@core@@YAHPBD0H0@Z
msvcp71
?_Nomemory@std@@YAXXZ
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBG@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@G@Z
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
msvcr71
_XcptFilter
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
wcscpy
wcslen
??3@YAXPAX@Z
??_V@YAXPAX@Z
__CxxFrameHandler
swprintf
memcpy
memset
wcsncpy
malloc
_callnewh
__security_error_handler
_except_handler3
__dllonexit
_onexit
_c_exit
_exit
__wgetmainargs
_cexit
exit
_wcmdln
_amsg_exit
_controlfp
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE