Behavioral task
behavioral1
Sample
fa8b427d7cd885f11cfdba01735f49165d47c35eb29d7d71d4c4cdb9db177cf0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fa8b427d7cd885f11cfdba01735f49165d47c35eb29d7d71d4c4cdb9db177cf0.exe
Resource
win10v2004-20220812-en
General
-
Target
fa8b427d7cd885f11cfdba01735f49165d47c35eb29d7d71d4c4cdb9db177cf0
-
Size
152KB
-
MD5
a33d8abb747325a28f99cd64c883051b
-
SHA1
2bcbab246e213d9fdf01fcd0bedf9cb64c724399
-
SHA256
fa8b427d7cd885f11cfdba01735f49165d47c35eb29d7d71d4c4cdb9db177cf0
-
SHA512
1858bfda3c0220d4821ed972bcc5ce4aef4d66c048eb41bd44513d53a189c92547b674ad4d308e04feb27847e30f32bed930a6ae177e13e8eacf53f2e57daf22
-
SSDEEP
3072:fugX91wQYA8L0gVRfYjBFPGRKjrTRYcaQqVEtQ0XEa2n+UooOoagL8gkhvHZ9kls:WgN1wQYrQgYjHP5nTRb9tQ00a2+JoOl9
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fa8b427d7cd885f11cfdba01735f49165d47c35eb29d7d71d4c4cdb9db177cf0.exe windows x86
44da0db04844b8ad84714d28b1110c57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
calloc
strchr
swprintf
free
malloc
wprintf
isprint
sprintf
_snwprintf
_vsnwprintf
wcsncpy
swscanf
_wtoi
wcscmp
_wgetcwd
_wcsicmp
tolower
realloc
_wtol
_wsplitpath
_wmakepath
_c_exit
_exit
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
wcscat
isdigit
wcscpy
wcslen
advapi32
RegOpenKeyExA
RegQueryValueExA
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegisterEventSourceW
ReportEventW
DeregisterEventSource
ReadEventLogW
OpenEventLogW
ClearEventLogW
CloseEventLog
GetUserNameW
kernel32
SetFilePointer
ReadFile
ReleaseSemaphore
WriteFile
GetModuleFileNameW
CreateDirectoryW
GetLastError
LocalFree
SetErrorMode
SetEvent
GetLocalTime
GetDateFormatW
OpenProcess
CreateFileW
WideCharToMultiByte
MultiByteToWideChar
CreateThread
DeleteFileW
GetFileAttributesW
LoadResource
FindResourceExW
ExpandEnvironmentStringsW
GetProcAddress
FreeLibrary
InterlockedCompareExchange
LoadLibraryA
GetModuleHandleA
CreateSemaphoreW
OpenSemaphoreW
TerminateThread
TerminateProcess
GetCommandLineW
DelayLoadFailureHook
GetModuleHandleW
FormatMessageW
ExitProcess
GetComputerNameW
GetVersion
GetSystemInfo
ProcessIdToSessionId
CloseHandle
WaitForSingleObject
Sleep
gdi32
SelectObject
GetTextMetricsW
GetTextExtentPointW
GetStockObject
user32
CallWindowProcW
GetCursorPos
ScreenToClient
ChildWindowFromPoint
GetDlgCtrlID
WinHelpW
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextA
GetDlgItemTextW
GetSystemMenu
AppendMenuW
GetDC
ReleaseDC
LoadIconW
LoadCursorW
RegisterClassW
CreateDialogParamW
MessageBeep
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
DialogBoxParamW
GetDlgItem
ShowWindow
EnableWindow
DefDlgProcW
KillTimer
PostQuitMessage
DefWindowProcW
SetTimer
EndDialog
SetDlgItemTextW
MessageBoxW
EnumChildWindows
SetWindowLongW
GetWindowLongW
UpdateWindow
SendMessageW
PostMessageW
SetForegroundWindow
GetParent
SetFocus
dbgeng
DebugCreate
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE