Behavioral task
behavioral1
Sample
7aec464c5853ac41cf51515f80fb4b03f51bbbf8cd65fb58e3a283bf380f6ac7.exe
Resource
win7-20220812-en
General
-
Target
7aec464c5853ac41cf51515f80fb4b03f51bbbf8cd65fb58e3a283bf380f6ac7
-
Size
264KB
-
MD5
a341df3622a04e0ff35b111704df1e17
-
SHA1
8fcf2697229e08bafc5a1e078a25c6245414f767
-
SHA256
7aec464c5853ac41cf51515f80fb4b03f51bbbf8cd65fb58e3a283bf380f6ac7
-
SHA512
2b0ad0d31c1f01802db7562b4ef3b6c30100e4727fc7b1af3d74b7d3d2e29721d906f473fbf510741a03e966269d101c51354c35d9440ed811005b9a77aa101a
-
SSDEEP
6144:97jnP7AAaYwPWZDpFUn57qr3nAhALOAMLXsv5F:97jP7ARrwpFI7qr3nA6iAOshF
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7aec464c5853ac41cf51515f80fb4b03f51bbbf8cd65fb58e3a283bf380f6ac7.exe windows x86
302f452ee2a69da0419084a05037f00b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenA
WaitForSingleObject
CreateThread
CreateEventA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
RaiseException
LoadLibraryExA
Sleep
GetCurrentThreadId
GetCommandLineA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetConsoleMode
lstrlenW
MultiByteToWideChar
OpenEventA
SetEvent
CloseHandle
InterlockedDecrement
WideCharToMultiByte
lstrcmpiA
GetModuleHandleA
FindResourceA
GetProcAddress
GetConsoleCP
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
LocalFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
VirtualFree
HeapDestroy
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetCPInfo
GetOEMCP
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
CharNextA
wsprintfA
PostThreadMessageA
DefWindowProcA
RegisterClassA
CreateWindowExA
GetMessageA
DispatchMessageA
UnregisterClassA
advapi32
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
IsTextUnicode
RegEnumKeyExA
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE