Behavioral task
behavioral1
Sample
111d427e44a80357c877c4b32e43313d80619d47f92900a6e4abf6652da20719.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
111d427e44a80357c877c4b32e43313d80619d47f92900a6e4abf6652da20719.exe
Resource
win10v2004-20220901-en
General
-
Target
111d427e44a80357c877c4b32e43313d80619d47f92900a6e4abf6652da20719
-
Size
148KB
-
MD5
5bca900b682e7f8d3060fbe285fe9800
-
SHA1
3556a46053b599c82494f269d25020bdf009f8cc
-
SHA256
111d427e44a80357c877c4b32e43313d80619d47f92900a6e4abf6652da20719
-
SHA512
8e30f676824258cede3d80ef7cee90402b0e9c832563715c1deecb8164b7cd5a40d335dcb72b3a0def3696845299f9ff08ef25cc4b208dbeec167164c410ff6d
-
SSDEEP
3072:+PoKoKQQmHuBt8j1Q1dar97cInu/4nzvmK:+P+Q7PVcri4t
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
111d427e44a80357c877c4b32e43313d80619d47f92900a6e4abf6652da20719.exe windows x86
817e5aec0800bfc81ecb76d83d703b2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
GetVersionExA
FindFirstFileA
CopyFileA
DeleteFileA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
HeapFree
GetLastError
CloseHandle
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FindClose
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
SetStdHandle
FlushFileBuffers
ReadFile
CreateFileA
GetProcAddress
LoadLibraryA
SetFilePointer
SetEndOfFile
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE