Behavioral task
behavioral1
Sample
a20fd21f30d60a156e23d8e359c4de1fa8be423c9332fe4c14fb0ac5d9dc98a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a20fd21f30d60a156e23d8e359c4de1fa8be423c9332fe4c14fb0ac5d9dc98a9.exe
Resource
win10v2004-20220812-en
General
-
Target
a20fd21f30d60a156e23d8e359c4de1fa8be423c9332fe4c14fb0ac5d9dc98a9
-
Size
264KB
-
MD5
a226713bda208268070551b2903be700
-
SHA1
340e6dbe1c427c35f74223a82059e580a6c953ab
-
SHA256
a20fd21f30d60a156e23d8e359c4de1fa8be423c9332fe4c14fb0ac5d9dc98a9
-
SHA512
f3f81d5340689b219ccf1daf1c0067f7361778acf2360fa46a2a9a1bdcbdb9c2b692250802f9c821263d00f496626d56ea1ade90c9d42ccb1161001156e3ae83
-
SSDEEP
6144:RvfuzJV4wzkxklHV3szBiTu/Cxp7chChlAyLWCXCIGK4:+V4mZ6BAu/CxpIhChlBLZ7d4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a20fd21f30d60a156e23d8e359c4de1fa8be423c9332fe4c14fb0ac5d9dc98a9.exe windows x86
fd5e6ee364c6c259dd2750580b2177f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetProfileStringA
WriteFile
GetCurrentProcess
SetErrorMode
GetOEMCP
GetCPInfo
SizeofResource
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
MulDiv
SetLastError
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
InterlockedDecrement
GlobalUnlock
GlobalFree
LockResource
OutputDebugStringA
FindResourceA
LoadResource
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
lstrlenA
GetSystemDefaultUILanguage
GetUserDefaultLangID
GetUserDefaultUILanguage
lstrcatA
GetLastError
GetSystemDefaultLangID
OpenFile
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
GetEnvironmentStringsW
user32
CreateWindowExA
GetDlgCtrlID
GetWindowTextA
GetWindowTextLengthA
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
GetClassInfoA
wsprintfA
WinHelpA
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetClassNameA
PtInRect
GetSysColorBrush
DestroyMenu
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
GetWindowPlacement
UnhookWindowsHookEx
GetClassLongA
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
ValidateRect
IsWindowVisible
PeekMessageA
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SetCursor
MonitorFromRect
MoveWindow
GetDesktopWindow
EnumDisplayMonitors
GetMonitorInfoA
FindWindowA
LoadIconA
EnableWindow
GetClientRect
GetWindowRect
IsIconic
DrawIcon
GetWindowThreadProcessId
AttachThreadInput
SystemParametersInfoA
SetActiveWindow
SetForegroundWindow
PostQuitMessage
GetDC
ReleaseDC
SetRect
FillRect
GetCapture
SetCapture
ScreenToClient
ReleaseCapture
GetParent
ShowWindow
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
IsWindow
MapVirtualKeyA
MessageBoxA
wvsprintfA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
keybd_event
DefWindowProcA
PostMessageA
GetCursorPos
GetForegroundWindow
SetCursorPos
GetSystemMetrics
GetAsyncKeyState
SendMessageA
SetPropA
EndDialog
GetPropA
LoadStringA
LoadCursorA
RegisterClassA
IsWindowUnicode
CharNextA
InflateRect
DefDlgProcA
InvalidateRect
DrawFocusRect
CallNextHookEx
gdi32
GetClipBox
SetTextColor
SetBkColor
GetObjectA
SaveDC
RestoreDC
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
CreateBitmap
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
SelectObject
BitBlt
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateDIBitmap
PatBlt
GetTextExtentPointA
GetStockObject
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
comctl32
ord17
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE