Behavioral task
behavioral1
Sample
5a12a8caed89c8c2284dc9806715426d1daaa368647e99a12952e73031cc1aeb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5a12a8caed89c8c2284dc9806715426d1daaa368647e99a12952e73031cc1aeb.exe
Resource
win10v2004-20220812-en
General
-
Target
5a12a8caed89c8c2284dc9806715426d1daaa368647e99a12952e73031cc1aeb
-
Size
128KB
-
MD5
a22b4678cfa591a7b9d12667cd4a4f41
-
SHA1
963f1266eb9302adbe9ea41b7d2f54ddafc807e4
-
SHA256
5a12a8caed89c8c2284dc9806715426d1daaa368647e99a12952e73031cc1aeb
-
SHA512
159598176260ceb36a3a9fd55e87659f5128d25dfa0d75ef9e8b0fe08471013193efa734d9836d19e0fac67d3157b4faaba5fc5c2d27b33dbe19bb32f877b9bf
-
SSDEEP
3072:xkvshFYRhLsDI6inPzaJB1iI88g853Phv6Om:xVYRhLxPU1iI88Rp6Om
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5a12a8caed89c8c2284dc9806715426d1daaa368647e99a12952e73031cc1aeb.exe windows x86
2251a6cf91b4ecdd822567a05a048b78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegDeleteKeyExW
kernel32
GetSystemWindowsDirectoryW
GetConsoleMode
GetFileType
LocalFree
WriteFile
WideCharToMultiByte
LocalAlloc
WriteConsoleW
GetStdHandle
FreeLibrary
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
GetFileAttributesW
FindNextFileW
FindClose
FindFirstFileW
DeleteFileW
SetFileAttributesW
CopyFileW
GetLastError
CreateDirectoryW
GetSystemTimeAsFileTime
GetModuleHandleW
HeapSetInformation
SetThreadPreferredUILanguages
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
_exit
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_vsnwprintf
fgetwc
_iob
memset
__wgetmainargs
tolower
_wfullpath
towupper
memcpy
_wcsicmp
wcsrchr
_XcptFilter
apphelp
SdbReadDWORDTag
SdbIsStandardDatabase
SdbRegisterDatabaseEx
SdbGetBinaryTagData
SdbFindNextTag
SdbOpenDatabase
SdbReadBinaryTag
SdbCloseDatabase
SdbFindFirstTag
SdbGetStringTagPtr
SdbUnregisterDatabase
user32
LoadStringW
shell32
ord680
ntdll
RtlFreeUnicodeString
NtDeleteKey
RtlStringFromGUID
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE