Behavioral task
behavioral1
Sample
3bfc4ac451c077d7a2b195a7981e5da8ad4a407886c44f39a439e1262fb5ddfb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3bfc4ac451c077d7a2b195a7981e5da8ad4a407886c44f39a439e1262fb5ddfb.exe
Resource
win10v2004-20220812-en
General
-
Target
3bfc4ac451c077d7a2b195a7981e5da8ad4a407886c44f39a439e1262fb5ddfb
-
Size
121KB
-
MD5
a1b6433edbd59d0d30ecc7f36d5b77a1
-
SHA1
0cb92019af6f2fa7f9239e0659e066b05af031a8
-
SHA256
3bfc4ac451c077d7a2b195a7981e5da8ad4a407886c44f39a439e1262fb5ddfb
-
SHA512
9a70858358e2314fee5bf2a56e7ec9edee1f25bd7c50cb95f8004dd935a41790b8cbf7973d413cb7631bc717df4745bc86aebac6e0ba1762e901eacfa3e2a331
-
SSDEEP
3072:7Rroa7Zj5c11lfYDA28mOQz13OWFIpn/NxRcz8uFTzBWhs7aOxTCPM:iIZkfAB3zUFxuFT8h8awTJ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3bfc4ac451c077d7a2b195a7981e5da8ad4a407886c44f39a439e1262fb5ddfb.exe windows x86
ebcbb3a6ac1ad9affc6a2581a7f3930f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegGetValueW
RegOpenKeyExW
RegCloseKey
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
HeapAlloc
HeapFree
GetSystemWindowsDirectoryW
GetCommandLineW
FormatMessageW
LocalFree
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
GetProcessHeap
Sleep
InterlockedExchange
msvcrt
_controlfp
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
memset
wprintf
_wcsicmp
shell32
CommandLineToArgvW
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE