Behavioral task
behavioral1
Sample
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe
Resource
win10v2004-20220812-en
General
-
Target
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2
-
Size
240KB
-
MD5
92a7b70db9c11c4bb6119ace37f6eadd
-
SHA1
7b877162b3547988943c441005248014fa1df9f2
-
SHA256
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2
-
SHA512
193abd992ec19d40e4e6ee8f3d70f72a4e59258940b86cbe9b3499ea2943f1099be27a97824a3aec613d6c3dc2dcc8a178c6a940df5b3a67d1251b3e0712b122
-
SSDEEP
6144:SjzOsQW35/dR+SOVTSOqZCxbLGcRE5I5t7k6vQka5u:h+vUS2WOqkxbCcRE5L6vQka5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe windows x86
e3f97cfb18135dbbd85462a63347ca6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord6
comdlg32
CommDlgExtendedError
GetSaveFileNameA
GetOpenFileNameA
shell32
DragFinish
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
DragQueryFileA
DragAcceptFiles
ShellExecuteA
kernel32
GetUserDefaultLCID
IsValidLocale
GetSystemDefaultLCID
GetProcAddress
LoadLibraryA
CreateThread
GetWindowsDirectoryA
GetVersionExA
OpenFile
InterlockedDecrement
HeapCreate
CreateMutexA
OpenMutexA
WriteFile
GetCurrentProcess
GetModuleHandleA
GetModuleFileNameA
GetCurrentThreadId
InterlockedIncrement
GetVersion
GetLocaleInfoA
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
CreateFileA
CloseHandle
LoadLibraryExA
FindResourceA
LoadResource
GetLastError
SizeofResource
FreeLibrary
lstrlenW
lstrcpynA
lstrcmpiA
lstrlenA
SetFilePointer
GetSystemDirectoryA
FlushInstructionCache
GlobalLock
GlobalUnlock
lstrcatA
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
lstrcpyA
EnterCriticalSection
GetFileAttributesA
GetCurrentDirectoryA
GetOEMCP
GetEnvironmentStringsW
GetEnvironmentStrings
GetCPInfo
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
ExitProcess
HeapFree
TerminateProcess
HeapReAlloc
GetCommandLineA
HeapAlloc
GetACP
GetStartupInfoA
SetHandleCount
GetStdHandle
GetFileType
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
VirtualFree
RtlUnwind
VirtualAlloc
HeapSize
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
FlushFileBuffers
user32
SetWindowPos
IsWindow
GetClientRect
InvalidateRect
SetFocus
PeekMessageA
TranslateMessage
DispatchMessageA
LoadStringA
CharNextA
RedrawWindow
CreateWindowExA
GetWindowPlacement
SetForegroundWindow
LoadAcceleratorsA
EndDialog
SetDlgItemTextA
GetDlgItemTextA
GetWindow
MessageBoxA
FindWindowA
IsIconic
GetMessageA
IsClipboardFormatAvailable
PostMessageA
LoadMenuA
EnableMenuItem
SetActiveWindow
GetDesktopWindow
GetSysColor
DialogBoxParamA
GetActiveWindow
CharPrevA
SendDlgItemMessageA
SendMessageA
MapWindowPoints
SystemParametersInfoA
GetWindowRect
GetWindowLongA
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
DefWindowProcA
CallWindowProcA
BringWindowToTop
UpdateWindow
DefMDIChildProcA
GetMenuItemCount
DrawMenuBar
GetParent
IsWindowVisible
SetWindowTextA
AdjustWindowRectEx
EnableWindow
PostQuitMessage
MoveWindow
DefFrameProcA
TranslateMDISysAccel
TranslateAcceleratorA
DestroyWindow
LoadImageA
ShowWindow
GetSubMenu
CheckMenuItem
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
ole32
CoInitialize
CoRegisterClassObject
CoUninitialize
CoCreateInstance
CoRevokeClassObject
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
GetHGlobalFromStream
CreateStreamOnHGlobal
oleaut32
VariantInit
LoadTypeLi
RegisterTypeLi
SetErrorInfo
LoadRegTypeLi
VarI4FromStr
VariantChangeType
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysAllocStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE