Behavioral task
behavioral1
Sample
bb64d8d7de89b8f9e7b35ae11ab4c63d2715e7bae8ee0b0e456aec3d24a31321.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb64d8d7de89b8f9e7b35ae11ab4c63d2715e7bae8ee0b0e456aec3d24a31321.exe
Resource
win10v2004-20220812-en
General
-
Target
bb64d8d7de89b8f9e7b35ae11ab4c63d2715e7bae8ee0b0e456aec3d24a31321
-
Size
388KB
-
MD5
a156f32e8d2fe70de5b0a7d178f732e0
-
SHA1
02271edad943fc87e4a7f68cc89f6e21b5704018
-
SHA256
bb64d8d7de89b8f9e7b35ae11ab4c63d2715e7bae8ee0b0e456aec3d24a31321
-
SHA512
db7897946abeec59f67183821b1f15adbff652fa06bfc9b3f5e08f20069b2d1b546dd118b6e377e9f6b01d66fd9a85ea323c15a7cf67ae74cb41b5c46819b9be
-
SSDEEP
6144:UPeyxTH6NnPI99q7N+oRnku9TKqKpItMnddFcCd5dg5Jq90:UPbZB9yznBTKqDt4dZS5sG
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
bb64d8d7de89b8f9e7b35ae11ab4c63d2715e7bae8ee0b0e456aec3d24a31321.exe windows x86
5002bceb823d3d7321ac4b2e8ee9f66d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
CryptReleaseContext
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegCreateKeyExA
kernel32
FindFirstFileW
FindResourceA
FindFirstFileA
GetFileAttributesA
GetModuleFileNameW
GetModuleHandleW
SetFileAttributesA
SetFileAttributesW
FindNextFileA
FindNextFileW
DeleteFileW
GetPrivateProfileIntW
GetTempPathA
GetTempPathW
SizeofResource
LockResource
LoadResource
SetLastError
CopyFileA
CopyFileW
RemoveDirectoryA
RemoveDirectoryW
CreateMutexW
CreateFileA
LoadLibraryA
LoadLibraryW
GetPrivateProfileStringA
GetPrivateProfileStringW
CreateProcessW
FindClose
SetErrorMode
DeleteCriticalSection
GetTickCount
IsBadReadPtr
InterlockedExchange
GlobalAddAtomA
GlobalDeleteAtom
GetVersionExA
GetSystemTimeAsFileTime
GetACP
GetVersionExW
QueryPerformanceCounter
QueryPerformanceFrequency
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
GetCurrentProcessId
GetProcessTimes
GetLocalTime
FlushFileBuffers
GetAtomNameA
lstrcmpA
RaiseException
DeleteFileA
CreateFileW
CreateEventW
LocalReAlloc
WaitForSingleObject
CloseHandle
ReleaseMutex
lstrlenA
WideCharToMultiByte
lstrlenW
ExitProcess
Sleep
GetLastError
GetCommandLineA
LocalFree
MultiByteToWideChar
SetUnhandledExceptionFilter
LocalAlloc
GetCommandLineW
GetCurrentThreadId
InitializeCriticalSection
GetModuleHandleA
UnmapViewOfFile
GetCurrentProcess
LeaveCriticalSection
GetPrivateProfileIntA
SetEvent
CreateProcessA
CreateMutexA
lstrcpynA
DuplicateHandle
CreateFileMappingA
CreateEventA
MapViewOfFile
WriteFile
GetModuleFileNameA
EnterCriticalSection
GetProcAddress
SetFilePointer
FreeLibrary
CreateFileMappingW
user32
GetDoubleClickTime
SetTimer
KillTimer
GetSubMenu
EnableMenuItem
GetForegroundWindow
SetForegroundWindow
GetCursorPos
LoadMenuA
SetFocus
RegisterWindowMessageA
IsWindow
GetWindowTextA
DestroyWindow
TranslateMessage
DestroyIcon
CreateWindowExA
CreateWindowExW
DefWindowProcA
DefWindowProcW
DispatchMessageA
FindWindowW
FindWindowExA
FindWindowExW
GetMessageA
GetMessageW
MessageBoxW
GetWindowLongA
GetWindowLongW
LoadCursorA
LoadCursorW
CreateIconFromResource
CreateIconFromResourceEx
LookupIconIdFromDirectoryEx
LoadImageA
LoadImageW
DestroyMenu
DispatchMessageW
TrackPopupMenuEx
LoadStringW
PostMessageA
PostMessageW
PostThreadMessageA
PostThreadMessageW
RegisterWindowMessageW
CharNextA
SendMessageTimeoutA
SendMessageTimeoutW
SetWindowLongA
SetWindowLongW
SystemParametersInfoA
SystemParametersInfoW
RegisterClassExA
RegisterClassExW
GetClassInfoExA
GetClassInfoExW
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadStringA
wvsprintfA
MessageBoxA
gdi32
GetDeviceCaps
GetPaletteEntries
DeleteObject
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE