Behavioral task
behavioral1
Sample
7615f405d7a48be6f818a34741d0c0364a7c128e29f873606b1f9c794f29aefe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7615f405d7a48be6f818a34741d0c0364a7c128e29f873606b1f9c794f29aefe.exe
Resource
win10v2004-20220812-en
General
-
Target
7615f405d7a48be6f818a34741d0c0364a7c128e29f873606b1f9c794f29aefe
-
Size
149KB
-
MD5
8414fe86156d5c623b436dabb25c9070
-
SHA1
d9e0b59f5c68ecd574a9fa605050e3246c6d5794
-
SHA256
7615f405d7a48be6f818a34741d0c0364a7c128e29f873606b1f9c794f29aefe
-
SHA512
55641f8c71a32fb490c1d01badc0327f2c6d8017a5ed3c8ecf5fb0efe60ca7085b8ad7dfe2613d0eaaa2377586f575ea8da3b3e618f662d6fca43a7bc946b253
-
SSDEEP
3072:LlC8z14ajVRtqMiu+7FY8foSq9Tf5UzUUmzm5:LI+eajVRUMiuSlox8
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7615f405d7a48be6f818a34741d0c0364a7c128e29f873606b1f9c794f29aefe.exe windows x86
5cdf2caab0eec3b62d14119d94a01c56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
__p__commode
memmove
__p__fmode
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_wcsicmp
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
__set_app_type
_controlfp
__dllonexit
_onexit
_except_handler3
isdigit
??3@YAXPAX@Z
atl
ord30
ord32
ord17
ord23
ord21
ord16
ord20
advapi32
RegEnumKeyExW
RegQueryValueExW
StartServiceCtrlDispatcherW
RegNotifyChangeKeyValue
RegOpenKeyExW
RegCloseKey
RegisterServiceCtrlHandlerW
SetServiceStatus
kernel32
GetStartupInfoW
GetModuleHandleA
CloseHandle
EnterCriticalSection
lstrcpyW
GetCurrentProcess
Sleep
WaitForMultipleObjects
WaitForSingleObject
UnregisterWait
DeleteTimerQueueTimer
RegisterWaitForSingleObject
BindIoCompletionCallback
ReadFile
WriteFile
HeapAlloc
GetProcessHeap
HeapFree
CreateEventW
SetEvent
CreateTimerQueueTimer
GetCurrentProcessId
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
CreateTimerQueue
InterlockedIncrement
InterlockedDecrement
DeleteTimerQueueEx
DuplicateHandle
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoInitializeEx
CLSIDFromString
oleaut32
SysAllocString
SysFreeString
wsock32
bind
WSAGetLastError
getsockname
ord1142
setsockopt
WSAStartup
htons
listen
WSACleanup
closesocket
ioctlsocket
htonl
shutdown
ord1141
getpeername
ntohs
ws2_32
WSAEventSelect
WSASocketW
WSAConnect
WSAEnumNetworkEvents
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE