Behavioral task
behavioral1
Sample
f8472e7d7e94172b33e816ec3ccfdc9f36a027353932e3f477d60321e203b903.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f8472e7d7e94172b33e816ec3ccfdc9f36a027353932e3f477d60321e203b903.exe
Resource
win10v2004-20220812-en
General
-
Target
f8472e7d7e94172b33e816ec3ccfdc9f36a027353932e3f477d60321e203b903
-
Size
424KB
-
MD5
a2869a0bc15cb5a2d2d61d8ad8b33ac2
-
SHA1
f48f0e5b809335928bc9730d1005f4bb4d26712b
-
SHA256
f8472e7d7e94172b33e816ec3ccfdc9f36a027353932e3f477d60321e203b903
-
SHA512
b003a2a7ae4d275ea4211faef01200b2cab24e873481c17508c82af0a3455bb97862f0097b4129f58a460782734d1521f1b96dcb13a2cea42fac827f03f1c3f2
-
SSDEEP
6144:kwvSxOJzS4cqthEus5iwSMdKrh8FtODbaNlmLlb:LcqthTs5iwSMoC2DboILl
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f8472e7d7e94172b33e816ec3ccfdc9f36a027353932e3f477d60321e203b903.exe windows x86
ab1c0812d830512b74e3e8dcad170827
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameA
SearchPathA
GetVersionExA
GetStringTypeA
DeviceIoControl
RtlUnwind
GetFileType
WriteFile
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
HeapCreate
HeapDestroy
UnhandledExceptionFilter
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetOEMCP
GetACP
WideCharToMultiByte
HeapSize
HeapReAlloc
GetCPInfo
GetCommandLineA
GetStartupInfoA
GetVersion
GetCurrentProcess
TerminateProcess
GetModuleHandleA
HeapFree
HeapAlloc
VirtualAlloc
ExitProcess
GetStringTypeW
SetFilePointer
SetStdHandle
FlushFileBuffers
SetEndOfFile
ReadFile
GlobalFree
IsBadWritePtr
VirtualFree
FreeLibrary
GetProcAddress
GetLastError
LoadLibraryA
CloseHandle
CreateFileA
OpenFile
user32
GetDesktopWindow
ClientToScreen
IsWindowVisible
GetSystemMetrics
ScreenToClient
IsZoomed
EndDialog
GetWindowRect
GetClientRect
IsIconic
ReleaseDC
GetDC
MessageBoxA
wsprintfA
DispatchMessageA
PeekMessageA
ShowWindow
TranslateMessage
FindWindowA
SetCursor
SetForegroundWindow
LoadCursorA
CreateWindowExA
RegisterClassA
SetTimer
EndPaint
GetUpdateRect
BeginPaint
AdjustWindowRect
DestroyWindow
DefWindowProcA
UpdateWindow
SetWindowTextA
InvalidateRect
LoadStringA
PostQuitMessage
DialogBoxParamA
SendMessageA
SetDlgItemTextA
GetDlgItem
SetWindowPos
gdi32
CreateCompatibleDC
CreatePalette
GetSystemPaletteEntries
CreateSolidBrush
DeleteDC
DeleteObject
GetStockObject
GetDeviceCaps
SelectObject
CreatePen
Rectangle
SelectPalette
RealizePalette
CreateDIBSection
advapi32
RegEnumKeyExA
RegFlushKey
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
CloseServiceHandle
RegCloseKey
StartServiceA
CreateServiceA
DeleteService
OpenServiceA
ControlService
OpenSCManagerA
winmm
timeGetTime
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CPUCAP_T Size: 4KB - Virtual size: 335B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IS_MMX_T Size: 4KB - Virtual size: 46B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE