Behavioral task
behavioral1
Sample
56b39a56d40024633cfa7a7ff74739f782fea404a873fdabf4c6ddbe26e1cc31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56b39a56d40024633cfa7a7ff74739f782fea404a873fdabf4c6ddbe26e1cc31.exe
Resource
win10v2004-20220812-en
General
-
Target
56b39a56d40024633cfa7a7ff74739f782fea404a873fdabf4c6ddbe26e1cc31
-
Size
121KB
-
MD5
850c04033530c285f8d7f7b794d8e131
-
SHA1
a15bcad90200807640ce4ed6afa5b2bf8377d96c
-
SHA256
56b39a56d40024633cfa7a7ff74739f782fea404a873fdabf4c6ddbe26e1cc31
-
SHA512
e2167d8506ece888e31c5585216d5b09483798e90aeaa6b06ca22bad38eb8d805e12efce21f8de7782b48d8c217d731596f60e4dc3c23104d40be4361e421596
-
SSDEEP
1536:v+XOQJnsCjrDAHQG107S+NYB2CAZwxDWg4ctIoL59PGRf/73HbZyFklAHBmTwIrl:2eCsoW0v0xD7CovQ32HQsIr7c16
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
56b39a56d40024633cfa7a7ff74739f782fea404a873fdabf4c6ddbe26e1cc31.exe windows x86
9fc98c4b81afdf0aa8f3bf5405797761
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
kernel32
HeapSetInformation
VerifyVersionInfoA
VerSetConditionMask
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
CreateProcessA
GetPrivateProfileStringA
SetCurrentDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
MessageBoxA
msvcrt
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_XcptFilter
_exit
_cexit
strstr
memset
??3@YAXPAX@Z
__getmainargs
?terminate@@YAXXZ
shlwapi
PathFileExistsA
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE