Behavioral task
behavioral1
Sample
7e4f32f46945b3cde47c1b2e75d31c00483540708c00eead9fd0e0e8b57db733.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e4f32f46945b3cde47c1b2e75d31c00483540708c00eead9fd0e0e8b57db733.exe
Resource
win10v2004-20220812-en
General
-
Target
7e4f32f46945b3cde47c1b2e75d31c00483540708c00eead9fd0e0e8b57db733
-
Size
116KB
-
MD5
93353c2010068603c914725f20420150
-
SHA1
858738a548520d5220f864404b8dc7a0174c5181
-
SHA256
7e4f32f46945b3cde47c1b2e75d31c00483540708c00eead9fd0e0e8b57db733
-
SHA512
3a99aa39e0f50eb24a38eb7cd798f878bf79bccb5bb80ff0dadf306c1c48ba8d7a11c77cb25f578c17d0e3aa90f165f3811a28089d4341fd0424a60e8b2d505e
-
SSDEEP
3072:nFVGN7+aYbKLVEo84z+Fhr7dPI3X/+p7bnv6ydC:FAN7+HbKLuF395uEbntC
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7e4f32f46945b3cde47c1b2e75d31c00483540708c00eead9fd0e0e8b57db733.exe windows x86
a22166b2e1556f046a6e164c9dc52bfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteKeyW
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
kernel32
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE