Behavioral task
behavioral1
Sample
360d533fd39ef21e23fded19305c51e74a76139158755d92e36dcee8de44ce6c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
360d533fd39ef21e23fded19305c51e74a76139158755d92e36dcee8de44ce6c.exe
Resource
win10v2004-20220901-en
General
-
Target
360d533fd39ef21e23fded19305c51e74a76139158755d92e36dcee8de44ce6c
-
Size
180KB
-
MD5
83859f822098510f392565177f821203
-
SHA1
275d2f1f9344455307c7f379fd89d5955f98c054
-
SHA256
360d533fd39ef21e23fded19305c51e74a76139158755d92e36dcee8de44ce6c
-
SHA512
6735c7a2dcb168cd8b4259d5cc9c033c8d75b3faebf97afa08a6eceb80c4921d3554038b0ab5bed7d53f1c780e376ee5b3eba2d05379eb50080eb6e36a1e5bdc
-
SSDEEP
3072:2H+q+Q8wJno2lKiXNbb/seYUmEIBL0XJRi2t7gIAsVzszoWlsQPbxG6hd0Bozy2Z:flw9ayn0s7glCgz3WQPBhDB6J
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
360d533fd39ef21e23fded19305c51e74a76139158755d92e36dcee8de44ce6c.exe windows x86
598a7f2f9e7f148a2238db75bc40f232
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32
GetLastError
lstrlenW
CompareStringA
ExitProcess
FreeLibrary
SetErrorMode
GetStartupInfoA
GetProcAddress
lstrcatA
lstrcpyA
HeapFree
SetCurrentDirectoryA
CloseHandle
CreateMutexA
GetCommandLineW
MultiByteToWideChar
HeapAlloc
lstrlenA
GetVersion
GetCommandLineA
GetProcessHeap
SetThreadPriority
GetCurrentThread
LocalFree
LoadLibraryA
FormatMessageA
GetModuleHandleA
InterlockedExchange
LocalAlloc
RaiseException
user32
IsIconic
SetForegroundWindow
GetClassNameA
GetParent
GetDesktopWindow
GetWindowThreadProcessId
IsWindowVisible
GetWindow
MessageBoxA
FindWindowA
SendMessageTimeoutA
ShowWindow
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE