Behavioral task
behavioral1
Sample
e9ae724d6211c91852ae4d3cac1cbcf2544ed815bad79eacf5ff4e4d6c6ce753.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9ae724d6211c91852ae4d3cac1cbcf2544ed815bad79eacf5ff4e4d6c6ce753.exe
Resource
win10v2004-20220812-en
General
-
Target
e9ae724d6211c91852ae4d3cac1cbcf2544ed815bad79eacf5ff4e4d6c6ce753
-
Size
244KB
-
MD5
91b448812beb14145aef5fe9ba376860
-
SHA1
ba72177836afce3220bad83997b635a1c9408d8f
-
SHA256
e9ae724d6211c91852ae4d3cac1cbcf2544ed815bad79eacf5ff4e4d6c6ce753
-
SHA512
1c5770b4caa3fb83cb98019fea66ee48b293ca0b8fff6b28c7baec5f88a684582c029091646909acb4d21f652d1e7a3f2977986d43e283c2d20f2af495398948
-
SSDEEP
3072:7mbCoolK3RyJf0be49YZym4NEm59hW/eOpbQ:7qK+ymbnkym4Zrr7
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e9ae724d6211c91852ae4d3cac1cbcf2544ed815bad79eacf5ff4e4d6c6ce753.exe windows x86
1781cdae16d7129b544a661f4a4f8b31
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
FormatMessageA
GetTempPathA
GetModuleFileNameA
LocalFree
GetWindowsDirectoryA
FindNextFileA
LoadLibraryA
GetProcAddress
HeapReAlloc
VirtualAlloc
GetStringTypeW
GetCurrentProcess
GetStringTypeA
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
HeapAlloc
WaitForSingleObject
SetEvent
CreateEventA
CreateThread
GetVersionExA
ResetEvent
lstrcpyA
CreateMutexA
GetLastError
InitializeCriticalSection
FindClose
EnterCriticalSection
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
lstrcmpA
FindFirstFileA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetEnvironmentStringsW
GetACP
LeaveCriticalSection
GetCPInfo
MultiByteToWideChar
GetOEMCP
WideCharToMultiByte
LCMapStringA
user32
GetParent
SendDlgItemMessageA
SetTimer
KillTimer
SetWindowTextA
ShowWindow
LoadStringA
GetWindowLongA
SetWindowLongA
GetDlgItem
SendMessageA
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
PostMessageA
GetDC
SystemParametersInfoA
ReleaseDC
wsprintfA
GetDesktopWindow
MessageBoxA
gdi32
CreateFontIndirectA
GetDeviceCaps
advapi32
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegOpenKeyExA
AdjustTokenPrivileges
RegDeleteKeyA
RegSetValueExA
shell32
SHChangeNotify
SHFileOperationA
setupapi
SetupDiCallClassInstaller
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
SetupPromptReboot
comctl32
PropertySheetA
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE