Behavioral task
behavioral1
Sample
671fd05808fb87615413cc7e7b9ae3a05dbc40ecccc90898ca8616837deb6494.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
671fd05808fb87615413cc7e7b9ae3a05dbc40ecccc90898ca8616837deb6494.exe
Resource
win10v2004-20220812-en
General
-
Target
671fd05808fb87615413cc7e7b9ae3a05dbc40ecccc90898ca8616837deb6494
-
Size
260KB
-
MD5
a2cb3b536d34e480f03c745f23517f7b
-
SHA1
8757a5e5aa816779395ed0306b93638ceb7ad414
-
SHA256
671fd05808fb87615413cc7e7b9ae3a05dbc40ecccc90898ca8616837deb6494
-
SHA512
92d83c080d552773477ccc0e398e0f062a58295e127b3f323e2b144ef52c259818b075e2123233c406e0246b64e51e07966c7d145a0e5f89b4122acc6fec5062
-
SSDEEP
6144:91bsOJKKSAidqSxkCAUhRNwCZYmtX11hFkS2KTUO:9qYqZwcY41VkS2SUO
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
671fd05808fb87615413cc7e7b9ae3a05dbc40ecccc90898ca8616837deb6494.exe windows x86
31a7a625e3c5598b9ba0c005a1a1016a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
FileTimeToLocalFileTime
CloseHandle
GetLastError
GetFileInformationByHandle
CreateFileA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileAttributesA
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
LocalAlloc
LocalFree
ReadFile
WriteFile
SetFilePointer
ExitProcess
TerminateProcess
GetCurrentProcess
HeapFree
HeapAlloc
GetCommandLineA
GetVersion
MultiByteToWideChar
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
FileTimeToDosDateTime
HeapCreate
VirtualFree
VirtualAlloc
RtlUnwind
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
SetStdHandle
FlushFileBuffers
GetProcAddress
LoadLibraryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
HeapReAlloc
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 148KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE