Behavioral task
behavioral1
Sample
504066fb420ab985852b0dae0e9540a918f7c79ebf075fc65192b6ca8b98d4af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
504066fb420ab985852b0dae0e9540a918f7c79ebf075fc65192b6ca8b98d4af.exe
Resource
win10v2004-20220812-en
General
-
Target
504066fb420ab985852b0dae0e9540a918f7c79ebf075fc65192b6ca8b98d4af
-
Size
110KB
-
MD5
921d78f3d1d7b1cea702b762b8373994
-
SHA1
d5b3c3d81903a792e24291a4b03e883d9646d409
-
SHA256
504066fb420ab985852b0dae0e9540a918f7c79ebf075fc65192b6ca8b98d4af
-
SHA512
ddeedececf8099e67f62abed4185af485149032af496c5091796afa9ca1e5931ed5700c3d39ebdb4da5f5fbac882adb3354583a01295937de0ff7d9b85bb7538
-
SSDEEP
1536:wXjVIrwZ/k9hKl2XG2rydbydrSnRQcHYoMNfS1ukYSiwnen6EB30FQEsG48IQ:wi3/gGG2qbydrgQIPYNTEFQ248Z
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
504066fb420ab985852b0dae0e9540a918f7c79ebf075fc65192b6ca8b98d4af.exe windows x86
4f1be5c046a60f16956c433baca4f9cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostMessageA
PostQuitMessage
RegisterClassExA
MessageBoxA
InsertMenuA
wsprintfA
ShowWindowAsync
TrackPopupMenu
TranslateMessage
LoadIconA
LoadImageA
GetWindowThreadProcessId
GetWindowRect
GetParent
GetMessageA
GetCursorPos
FindWindowA
EnumWindows
DispatchMessageA
DefWindowProcA
CreateWindowExA
CreatePopupMenu
SetForegroundWindow
SetTimer
kernel32
GetModuleFileNameA
lstrcpynA
TerminateProcess
SetCurrentDirectoryA
GetModuleHandleA
CreateProcessA
GetLastError
GetFullPathNameA
GetExitCodeProcess
GetCommandLineA
FormatMessageA
ExitProcess
shell32
Shell_NotifyIconA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE