Behavioral task
behavioral1
Sample
6ebdef1f47b522130e24548797c08e31ab158820f12febcba732a0147f5737f1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6ebdef1f47b522130e24548797c08e31ab158820f12febcba732a0147f5737f1.exe
Resource
win10v2004-20220812-en
General
-
Target
6ebdef1f47b522130e24548797c08e31ab158820f12febcba732a0147f5737f1
-
Size
240KB
-
MD5
a0ab98998574b25dcd3aa66506e6a314
-
SHA1
687beb8b45d03e4c77cc6c76b5ad84fc1ccd6b86
-
SHA256
6ebdef1f47b522130e24548797c08e31ab158820f12febcba732a0147f5737f1
-
SHA512
2bd233afa824b386c93c49eaec848983212cd71bbfaeb0fcec15b22bf5bf3dd516f15eb44251c1e5e303dd7c0b812dfa63c8628be75dc168112e8aca018ec3a8
-
SSDEEP
3072:Sy4zOHuLiHuZQnskcJzz0bS7T8IR+Sj63Jlgg/ioWVyhZdQCI15IL/1eezH8wdrF:SjzOsQW55/dR+SOVT7/JzH8wdxfXc
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6ebdef1f47b522130e24548797c08e31ab158820f12febcba732a0147f5737f1.exe windows x86
e3f97cfb18135dbbd85462a63347ca6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord6
comdlg32
CommDlgExtendedError
GetSaveFileNameA
GetOpenFileNameA
shell32
DragFinish
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
DragQueryFileA
DragAcceptFiles
ShellExecuteA
kernel32
GetUserDefaultLCID
IsValidLocale
GetSystemDefaultLCID
GetProcAddress
LoadLibraryA
CreateThread
GetWindowsDirectoryA
GetVersionExA
OpenFile
InterlockedDecrement
HeapCreate
CreateMutexA
OpenMutexA
WriteFile
GetCurrentProcess
GetModuleHandleA
GetModuleFileNameA
GetCurrentThreadId
InterlockedIncrement
GetVersion
GetLocaleInfoA
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
CreateFileA
CloseHandle
LoadLibraryExA
FindResourceA
LoadResource
GetLastError
SizeofResource
FreeLibrary
lstrlenW
lstrcpynA
lstrcmpiA
lstrlenA
SetFilePointer
GetSystemDirectoryA
FlushInstructionCache
GlobalLock
GlobalUnlock
lstrcatA
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
lstrcpyA
EnterCriticalSection
GetFileAttributesA
GetCurrentDirectoryA
GetOEMCP
GetEnvironmentStringsW
GetEnvironmentStrings
GetCPInfo
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
ExitProcess
HeapFree
TerminateProcess
HeapReAlloc
GetCommandLineA
HeapAlloc
GetACP
GetStartupInfoA
SetHandleCount
GetStdHandle
GetFileType
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
VirtualFree
RtlUnwind
VirtualAlloc
HeapSize
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
FlushFileBuffers
user32
SetWindowPos
IsWindow
GetClientRect
InvalidateRect
SetFocus
PeekMessageA
TranslateMessage
DispatchMessageA
LoadStringA
CharNextA
RedrawWindow
CreateWindowExA
GetWindowPlacement
SetForegroundWindow
LoadAcceleratorsA
EndDialog
SetDlgItemTextA
GetDlgItemTextA
GetWindow
MessageBoxA
FindWindowA
IsIconic
GetMessageA
IsClipboardFormatAvailable
PostMessageA
LoadMenuA
EnableMenuItem
SetActiveWindow
GetDesktopWindow
GetSysColor
DialogBoxParamA
GetActiveWindow
CharPrevA
SendDlgItemMessageA
SendMessageA
MapWindowPoints
SystemParametersInfoA
GetWindowRect
GetWindowLongA
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
DefWindowProcA
CallWindowProcA
BringWindowToTop
UpdateWindow
DefMDIChildProcA
GetMenuItemCount
DrawMenuBar
GetParent
IsWindowVisible
SetWindowTextA
AdjustWindowRectEx
EnableWindow
PostQuitMessage
MoveWindow
DefFrameProcA
TranslateMDISysAccel
TranslateAcceleratorA
DestroyWindow
LoadImageA
ShowWindow
GetSubMenu
CheckMenuItem
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
ole32
CoInitialize
CoRegisterClassObject
CoUninitialize
CoCreateInstance
CoRevokeClassObject
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
GetHGlobalFromStream
CreateStreamOnHGlobal
oleaut32
VariantInit
LoadTypeLi
RegisterTypeLi
SetErrorInfo
LoadRegTypeLi
VarI4FromStr
VariantChangeType
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysAllocStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE