Behavioral task
behavioral1
Sample
da32b7c9825706b9e2d9520a13a36c703cc0ed89076669a802d4d32a7e2b9a44.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
da32b7c9825706b9e2d9520a13a36c703cc0ed89076669a802d4d32a7e2b9a44.exe
Resource
win10v2004-20220812-en
General
-
Target
da32b7c9825706b9e2d9520a13a36c703cc0ed89076669a802d4d32a7e2b9a44
-
Size
166KB
-
MD5
90ae0385c72e0c9847d202d06b841ff2
-
SHA1
99d4a774bc65997fc64ce50e4c6a595bd2deed51
-
SHA256
da32b7c9825706b9e2d9520a13a36c703cc0ed89076669a802d4d32a7e2b9a44
-
SHA512
624b81cc6bfdac3ba52b54c34e08c423265d8dcc0761dc9e60e45f6546d0be6ecbc566ee10e65ee2601cf1b57652b4e85572f4ed6b4837f2074ae3ef3727eb27
-
SSDEEP
3072:mmh3rp/j3j9vLBKbjfyEwDebFI7alKjos/SWG5QCLbuCt1oEI2ciPoE9HZozyCHi:j3rVj3ZBKbjfyxDeSdS1oLcZWyCHi
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
da32b7c9825706b9e2d9520a13a36c703cc0ed89076669a802d4d32a7e2b9a44.exe windows x86
db8ea43d8675bed1ae27a57d8248baa9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__setusermatherr
_initterm
__wgetmainargs
__winitenv
_cexit
_XcptFilter
_exit
_c_exit
_wfullpath
wcscat
_wtoi
wcsncpy
_getmbcp
wprintf
exit
ceil
_adjust_fdiv
wcslen
_wcsnicmp
swprintf
wcstod
wcscpy
__p__commode
_wfopen
fgetws
fclose
_wtol
_wcslwr
wcsstr
_wsplitpath
_wmakepath
wcstok
wcscmp
_ftol
__p__fmode
__set_app_type
_controlfp
_except_handler3
_wcsicmp
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
kernel32
LocalFree
GetUserDefaultUILanguage
GetThreadLocale
GetConsoleOutputCP
GetSystemDefaultLCID
SetThreadLocale
FindFirstFileW
FindNextFileW
FindClose
GetLastError
GetStringTypeExW
GetLocaleInfoW
SetConsoleTextAttribute
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
WriteFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FileTimeToSystemTime
HeapReAlloc
LoadLibraryW
FreeLibrary
SystemTimeToFileTime
GetConsoleMode
SetConsoleMode
ReadFile
MultiByteToWideChar
ReadConsoleW
GetModuleFileNameW
GetStdHandle
WriteConsoleW
GetFileType
TerminateProcess
GetModuleHandleW
HeapFree
HeapAlloc
GetProcessHeap
GetConsoleScreenBufferInfo
FormatMessageW
ole32
CoUninitialize
StringFromGUID2
CoInitialize
CoCreateInstance
CoSetProxyBlanket
oleaut32
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
VariantChangeType
SafeArrayCreateVector
SafeArrayDestroy
SysAllocString
SysFreeString
VariantClear
user32
wsprintfW
CharToOemW
LoadStringW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
netapi32
NetUseDel
NetUseGetInfo
NetUseAdd
pdh
PdhTranslateLocaleCounterW
PdhPlaGetLogFileNameW
PlaTimeInfoToMilliSeconds
PdhPlaGetInfoW
PdhPlaSetInfoW
PdhPlaEnumCollectionsW
PdhPlaCreateW
PdhPlaDeleteW
PdhPlaStopW
PdhPlaStartW
PdhPlaScheduleW
PdhPlaGetScheduleW
shlwapi
StrCmpNIW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE