Behavioral task
behavioral1
Sample
f19670d704892dcbae02fcef7c5f9d0912eabf76dc3ce481076a256e4ef0e781.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f19670d704892dcbae02fcef7c5f9d0912eabf76dc3ce481076a256e4ef0e781.exe
Resource
win10v2004-20220812-en
General
-
Target
f19670d704892dcbae02fcef7c5f9d0912eabf76dc3ce481076a256e4ef0e781
-
Size
760KB
-
MD5
847d2ebc2c10afcc6f2662b87d7a4878
-
SHA1
c05fc3e83d3b94ab7e0908d6a075f5d385b6bf66
-
SHA256
f19670d704892dcbae02fcef7c5f9d0912eabf76dc3ce481076a256e4ef0e781
-
SHA512
e7ffd0e64b4b286cc047e364288e7cdf8213021373c2e60f59cc514f4eb825b4ef2e52380f91c03d734608c818d1ae570b582e89097d1756848b57b8dfbe85ae
-
SSDEEP
12288:yO6SLNnVYHBcVlaeja0vCRTfihlexP46Al+pi+pmV+pIn+pUZGiBtgLTuyM:d6SLdqIlaejaLRTfp46I+pi+pmV+pIn2
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f19670d704892dcbae02fcef7c5f9d0912eabf76dc3ce481076a256e4ef0e781.exe windows x86
5d21e0ad290ee268f6a602b6242dfee5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceFrequency
QueryPerformanceCounter
GetTickCount
GetSystemDefaultLangID
GetCurrentDirectoryA
GetModuleHandleA
OutputDebugStringA
GetFileType
CreateFileA
CloseHandle
FlushFileBuffers
GetLocaleInfoW
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
SetEndOfFile
SetStdHandle
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetModuleFileNameA
RaiseException
WideCharToMultiByte
MultiByteToWideChar
InterlockedIncrement
HeapValidate
GetProcessHeap
InterlockedDecrement
ReadFile
HeapSize
RtlUnwind
WriteFile
GetLastError
GetProcAddress
LoadLibraryA
GetVersionExA
HeapFree
Sleep
IsProcessorFeaturePresent
lstrcpynA
lstrlenA
lstrcpyA
GetSystemTime
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
SetFilePointer
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
user32
ScreenToClient
ShowCursor
GetWindowRect
MessageBoxA
wsprintfA
GetCursorPos
LoadIconA
DefWindowProcA
DispatchMessageA
PeekMessageA
GetMessageA
TranslateMessage
SetWindowLongA
GetWindowLongA
GetClassInfoA
RegisterClassA
SendMessageA
DestroyWindow
DrawTextW
DrawTextA
RegisterClassExA
GetDesktopWindow
GetSystemMetrics
CreateWindowExA
ShowWindow
SetCursor
LoadCursorA
gdi32
CreateCompatibleDC
SetTextColor
SelectObject
SetBkMode
GetObjectA
SetBkColor
DeleteObject
CreateDIBSection
DeleteDC
CreateFontA
CreateFontIndirectA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
d3d8
Direct3DCreate8
dinput8
DirectInput8Create
dsound
ord11
wsock32
htonl
bind
listen
inet_addr
htons
accept
WSAGetLastError
closesocket
ntohs
shutdown
WSACleanup
WSAStartup
select
send
sendto
recvfrom
recv
setsockopt
inet_ntoa
getsockopt
gethostbyaddr
gethostbyname
gethostname
WSAAsyncSelect
WSAAsyncGetHostByAddr
WSAAsyncGetHostByName
socket
connect
ioctlsocket
getsockname
d3dxof
DirectXFileCreate
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: 512KB - Virtual size: 508KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE