Behavioral task
behavioral1
Sample
5c1e73b1f3dfcb032e0b0d9d55ea80ae2b4040bdbd0592dea4b64648eb2d00b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c1e73b1f3dfcb032e0b0d9d55ea80ae2b4040bdbd0592dea4b64648eb2d00b6.exe
Resource
win10v2004-20220901-en
General
-
Target
5c1e73b1f3dfcb032e0b0d9d55ea80ae2b4040bdbd0592dea4b64648eb2d00b6
-
Size
328KB
-
MD5
a2c2b115752579d479a3c3b4f4f7d530
-
SHA1
84d6e78e4dc98b331846ec1611fc945962733594
-
SHA256
5c1e73b1f3dfcb032e0b0d9d55ea80ae2b4040bdbd0592dea4b64648eb2d00b6
-
SHA512
3833dd6b72aaa45fb76718ba1e7311ca45aa8d3b143b8587d2c936a054a30176b236d107247ed4605d85bbf650006b8326b1b91cdbbbd9faf07a48c9e1f73d79
-
SSDEEP
6144:uPeyxTNxE++swhjnZSBxnHNvPmOu+QUrT610gj7Q:uPbZLEldAB7vPBLZ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5c1e73b1f3dfcb032e0b0d9d55ea80ae2b4040bdbd0592dea4b64648eb2d00b6.exe windows x86
5002bceb823d3d7321ac4b2e8ee9f66d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
CryptReleaseContext
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegCreateKeyExA
kernel32
FindFirstFileW
FindResourceA
FindFirstFileA
GetFileAttributesA
GetModuleFileNameW
GetModuleHandleW
SetFileAttributesA
SetFileAttributesW
FindNextFileA
FindNextFileW
DeleteFileW
GetPrivateProfileIntW
GetTempPathA
GetTempPathW
SizeofResource
LockResource
LoadResource
SetLastError
CopyFileA
CopyFileW
RemoveDirectoryA
RemoveDirectoryW
CreateMutexW
CreateFileA
LoadLibraryA
LoadLibraryW
GetPrivateProfileStringA
GetPrivateProfileStringW
CreateProcessW
FindClose
SetErrorMode
DeleteCriticalSection
GetTickCount
IsBadReadPtr
InterlockedExchange
GlobalAddAtomA
GlobalDeleteAtom
GetVersionExA
GetSystemTimeAsFileTime
GetACP
GetVersionExW
QueryPerformanceCounter
QueryPerformanceFrequency
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
GetCurrentProcessId
GetProcessTimes
GetLocalTime
FlushFileBuffers
GetAtomNameA
lstrcmpA
RaiseException
DeleteFileA
CreateFileW
CreateEventW
LocalReAlloc
WaitForSingleObject
CloseHandle
ReleaseMutex
lstrlenA
WideCharToMultiByte
lstrlenW
ExitProcess
Sleep
GetLastError
GetCommandLineA
LocalFree
MultiByteToWideChar
SetUnhandledExceptionFilter
LocalAlloc
GetCommandLineW
GetCurrentThreadId
InitializeCriticalSection
GetModuleHandleA
UnmapViewOfFile
GetCurrentProcess
LeaveCriticalSection
GetPrivateProfileIntA
SetEvent
CreateProcessA
CreateMutexA
lstrcpynA
DuplicateHandle
CreateFileMappingA
CreateEventA
MapViewOfFile
WriteFile
GetModuleFileNameA
EnterCriticalSection
GetProcAddress
SetFilePointer
FreeLibrary
CreateFileMappingW
user32
GetDoubleClickTime
SetTimer
KillTimer
GetSubMenu
EnableMenuItem
GetForegroundWindow
SetForegroundWindow
GetCursorPos
LoadMenuA
SetFocus
RegisterWindowMessageA
IsWindow
GetWindowTextA
DestroyWindow
TranslateMessage
DestroyIcon
CreateWindowExA
CreateWindowExW
DefWindowProcA
DefWindowProcW
DispatchMessageA
FindWindowW
FindWindowExA
FindWindowExW
GetMessageA
GetMessageW
MessageBoxW
GetWindowLongA
GetWindowLongW
LoadCursorA
LoadCursorW
CreateIconFromResource
CreateIconFromResourceEx
LookupIconIdFromDirectoryEx
LoadImageA
LoadImageW
DestroyMenu
DispatchMessageW
TrackPopupMenuEx
LoadStringW
PostMessageA
PostMessageW
PostThreadMessageA
PostThreadMessageW
RegisterWindowMessageW
CharNextA
SendMessageTimeoutA
SendMessageTimeoutW
SetWindowLongA
SetWindowLongW
SystemParametersInfoA
SystemParametersInfoW
RegisterClassExA
RegisterClassExW
GetClassInfoExA
GetClassInfoExW
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadStringA
wvsprintfA
MessageBoxA
gdi32
GetDeviceCaps
GetPaletteEntries
DeleteObject
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE