Behavioral task
behavioral1
Sample
7347ab45f4079d7c2610443a12ca580a5ef70aae5eda1f5286f5ae92330d2fb1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7347ab45f4079d7c2610443a12ca580a5ef70aae5eda1f5286f5ae92330d2fb1.exe
Resource
win10v2004-20220812-en
General
-
Target
7347ab45f4079d7c2610443a12ca580a5ef70aae5eda1f5286f5ae92330d2fb1
-
Size
191KB
-
MD5
93a6e2b6ece67107bcf11d393ff23a78
-
SHA1
e28e10997cd1227e07d7f8926cd6033be0f98cff
-
SHA256
7347ab45f4079d7c2610443a12ca580a5ef70aae5eda1f5286f5ae92330d2fb1
-
SHA512
4c956ff942a429ae0cc17980aa3dabf8a2d81b5a6d892697e70175b43356c8e97faeeb0e6e45479ffea195db7724981a8697c4c9a5d66cb1b06781f793d55a7b
-
SSDEEP
3072:d5yQUGL555mp68j5H8EvaeCkmmNCDEEN9stu7yZLsugfPCz3ErAJPEc8OtxL+XP/:zyQUgj5mpHlIklNCDEEN9J7yZ4ZfPVrX
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7347ab45f4079d7c2610443a12ca580a5ef70aae5eda1f5286f5ae92330d2fb1.exe windows x86
152aee2ab20419d44875b94a2e5e3387
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
OpenProcessToken
FreeSid
AllocateAndInitializeSid
InitiateSystemShutdownW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegCreateKeyW
RegEnumValueW
kernel32
GetCommandLineW
CloseHandle
CreateFileW
lstrlenW
GetWindowsDirectoryW
WritePrivateProfileSectionW
CompareStringW
GetPrivateProfileSectionW
lstrcmpW
GetLastError
GetCurrentProcess
lstrcmpiW
GetModuleHandleW
FindNextFileW
FindFirstFileW
SetFileAttributesW
WritePrivateProfileStringW
GetPrivateProfileIntW
LoadLibraryExA
GetModuleHandleA
GetPrivateProfileStringW
LocalFree
LoadLibraryW
GetSystemDirectoryW
ExpandEnvironmentStringsW
lstrlenA
GetWindowsDirectoryA
CopyFileW
ReleaseMutex
WaitForSingleObject
CreateMutexW
HeapAlloc
HeapFree
GetProcessHeap
GetSystemInfo
GetCurrentProcessId
GetCurrentDirectoryW
GetProcAddress
FreeLibrary
LoadLibraryExW
FindClose
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
RtlUnwind
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetFileType
GetVersionExW
SetCurrentDirectoryW
CreateDirectoryW
WideCharToMultiByte
LocalAlloc
InterlockedIncrement
LoadLibraryA
InterlockedDecrement
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
user32
EndDialog
CheckDlgButton
SetWindowTextW
CharPrevW
CharNextW
LoadStringW
MessageBoxW
IsDlgButtonChecked
SetFocus
GetDlgItem
CheckRadioButton
DialogBoxParamW
GetDlgItemTextW
MessageBoxExW
IsWindow
msvcrt
_controlfp
?terminate@@YAXXZ
memset
_vsnwprintf
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_vsnprintf
cmutil
SzToWzWithAlloc
CmRealloc
GetOSVersion
GetOSMajorVersion
CmMalloc
CmFree
WzToSzWithAlloc
ole32
CoInitialize
CoUninitialize
shell32
SHGetPathFromIDListW
SHGetMalloc
SHChangeNotify
SHGetFolderPathW
SHFileOperationW
SHGetDesktopFolder
ShellExecuteExW
SHGetSpecialFolderLocation
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE