Behavioral task
behavioral1
Sample
5d865c38526ea6acaf2a4a3e0dc0ec94c9c002d103e53e8c574b7b3c9abdb4fd.exe
Resource
win7-20220901-en
General
-
Target
5d865c38526ea6acaf2a4a3e0dc0ec94c9c002d103e53e8c574b7b3c9abdb4fd
-
Size
344KB
-
MD5
448f171a2079956cdad1fa7ab165337d
-
SHA1
30eeee724284501842fd270ff183efa207c684dc
-
SHA256
5d865c38526ea6acaf2a4a3e0dc0ec94c9c002d103e53e8c574b7b3c9abdb4fd
-
SHA512
f42ee9d6b4ff7d6eda19213caf9fe3192ca98078459e292af592c79a3a61726a8ed1d4a51e759d8c0a1cb69a1dc367a1d85f2525025081cc59ccd753002bc62c
-
SSDEEP
6144:aUkIysUFXCGURqL3cvLBuQAL1dM0+Qm1yxqH0i9FOFWlB:aUkIyDNCGiA1dM0Jm1yxQ0i9QO
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5d865c38526ea6acaf2a4a3e0dc0ec94c9c002d103e53e8c574b7b3c9abdb4fd.exe windows x86
1beaf806beb09c22a7fb68827510a04a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
RtlUnwind
GetCommandLineA
HeapFree
TerminateProcess
GetStartupInfoA
HeapAlloc
ExitProcess
HeapReAlloc
HeapSize
GetACP
GetEnvironmentVariableA
HeapDestroy
HeapCreate
RaiseException
VirtualAlloc
IsBadWritePtr
GetTimeZoneInformation
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
VirtualFree
SizeofResource
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileAttributesA
GetTickCount
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
SetErrorMode
GetOEMCP
GetCPInfo
GetThreadLocale
GetProcessVersion
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetLastError
FormatMessageA
LocalFree
CreateFileA
GetFileSize
GetFileTime
CloseHandle
FileTimeToSystemTime
GetWindowsDirectoryA
GetSystemDirectoryA
GetVersionExA
GetProfileStringA
WritePrivateProfileStringA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalUnlock
MulDiv
GetModuleHandleA
GetProcAddress
SetLastError
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetFileType
SetUnhandledExceptionFilter
UnhandledExceptionFilter
user32
CharNextA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
InvalidateRect
CharUpperA
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
GetDesktopWindow
LoadCursorA
DestroyMenu
LoadStringA
wvsprintfA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
SetFocus
AdjustWindowRectEx
CopyRect
GetTopWindow
IsChild
GetSysColorBrush
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
MapDialogRect
SetWindowPos
GetWindow
SetWindowContextHelpId
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
PtInRect
GetClassNameA
WinHelpA
GetCapture
CreateWindowExA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
GetSysColor
MessageBoxExA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetWindowRect
LoadBitmapA
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
UnhookWindowsHookEx
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
gdi32
GetTextExtentPointA
CreateDIBitmap
DeleteObject
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
IntersectClipRect
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkMode
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateSolidBrush
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
comctl32
ord17
oledlg
ord8
ole32
OleUninitialize
OleInitialize
CoFreeUnusedLibraries
CoRevokeClassObject
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
CoTaskMemFree
CoTaskMemAlloc
CreateILockBytesOnHGlobal
olepro32
ord253
oleaut32
SysStringLen
SysAllocStringByteLen
VariantCopy
SysAllocString
VariantChangeType
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE