Behavioral task
behavioral1
Sample
a8b833fcd20c2a7d0c6b91cc9ed15034578ebb75c908437298770d36c7ddc4db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8b833fcd20c2a7d0c6b91cc9ed15034578ebb75c908437298770d36c7ddc4db.exe
Resource
win10v2004-20220812-en
General
-
Target
a8b833fcd20c2a7d0c6b91cc9ed15034578ebb75c908437298770d36c7ddc4db
-
Size
196KB
-
MD5
4e36a511710b4748030e12d44d9c7030
-
SHA1
45108471c8b36c34065c3e4e2ba54c85b31aff79
-
SHA256
a8b833fcd20c2a7d0c6b91cc9ed15034578ebb75c908437298770d36c7ddc4db
-
SHA512
2f843f31a242fb5b1fd8ad71baac587fd2888b854041f46c0b7f7e6dd55342119af18eb5475688f099839743c65df9c6bcf3b8ea2de043a2d76afdb812f2da5a
-
SSDEEP
6144:GtdB9WLXi4PCJKxQFpfbZzKwVIxG1HK8:GtdUy4K5nuYHK
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a8b833fcd20c2a7d0c6b91cc9ed15034578ebb75c908437298770d36c7ddc4db.exe windows x86
3e98f271697982cb6ec54bdc99908911
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
advapi32
RegCloseKey
comctl32
ImageList_Add
gdi32
SaveDC
ole32
OleDraw
oleaut32
VariantCopy
shell32
ShellExecuteA
user32
GetDC
version
VerQueryValueA
Sections
UPX0 Size: - Virtual size: 336KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 186KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rorg Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE