Behavioral task
behavioral1
Sample
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e.exe
Resource
win10v2004-20220812-en
General
-
Target
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e
-
Size
194KB
-
MD5
08798c5603d198935ebfb93bea35ae4c
-
SHA1
2a13d8c9d39553a55c5e2e264752285f302110a0
-
SHA256
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e
-
SHA512
e13d6b2b9040c3afbbbecccffa0879e36a68e5c5f857427e827de66c9c8ff90173821e3f91c8782e0b67001fe170b355e9cfa8dd69cbb1093ed3739836be70db
-
SSDEEP
6144:6yhj148ZJSoUzR5nReX3a0Kgb8OOZvatg+TCUR73JVg5gR+FoZ:6yFxsHnRea05Dw5URE5gUoZ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e.exe windows x86
227e7723246677b9a37436cd5a616b4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_abnormal_termination
_mbsnbicmp
_mbsnbcmp
wcsncmp
wcscmp
_mbscmp
_vsnwprintf
fwprintf
_iob
_snwprintf
setlocale
_mbsicmp
_mbslwr
iswctype
memmove
wcsrchr
wcschr
_mbscpy
_wcsnicmp
_mbsinc
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
wcscpy
_wcsicmp
wcslen
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
GetUserNameW
RegDeleteValueW
kernel32
GetVersionExW
HeapFree
MoveFileExW
GetModuleFileNameW
SetLastError
GetLastError
lstrcmpW
DeleteFileA
SetThreadExecutionState
CloseHandle
CreateProcessW
GetWindowsDirectoryW
GetProcessHeap
GetModuleHandleA
GetStartupInfoA
OutputDebugStringW
CreateFileA
CreateMutexA
GetComputerNameW
SetFileAttributesA
SetFilePointer
GetCurrentThreadId
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
HeapReAlloc
HeapAlloc
ExitProcess
SetEvent
CreateEventA
FormatMessageW
FormatMessageA
LocalAlloc
LocalFree
GetWindowsDirectoryA
SetThreadLocale
GetThreadLocale
WideCharToMultiByte
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
WriteFile
ReleaseMutex
RaiseException
lstrcpyA
lstrlenA
WaitForMultipleObjects
InterlockedIncrement
InterlockedExchange
Sleep
gdi32
SelectObject
GetTextMetricsW
GetTextExtentPointW
DeleteDC
CreateDCW
user32
LoadCursorW
SetCursor
DialogBoxParamW
GetForegroundWindow
SetForegroundWindow
EndDialog
GetWindowTextW
SetWindowTextW
SetFocus
SetTimer
GetDlgItem
SendMessageW
GetWindowRect
MapDialogRect
PostMessageW
KillTimer
MessageBoxA
MessageBoxW
CharLowerW
setupapi
SetupCloseInfFile
SetupLogErrorW
SetupOpenLog
SetupCloseLog
netapi32
NetApiBufferFree
NetUserModalsGet
NetUserGetInfo
NetUserSetInfo
comctl32
InitCommonControlsEx
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE