Behavioral task
behavioral1
Sample
5a0dc73799c7acff2caf6e2dfb2972409e87b3c3e7ee6fea7523512bad826bb8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5a0dc73799c7acff2caf6e2dfb2972409e87b3c3e7ee6fea7523512bad826bb8.exe
Resource
win10v2004-20220812-en
General
-
Target
5a0dc73799c7acff2caf6e2dfb2972409e87b3c3e7ee6fea7523512bad826bb8
-
Size
139KB
-
MD5
92c68291f1962f746d1e087880e5b879
-
SHA1
9d9e04b0fef8288b99d43f9a34ef84433c401ba8
-
SHA256
5a0dc73799c7acff2caf6e2dfb2972409e87b3c3e7ee6fea7523512bad826bb8
-
SHA512
042b0881323483a0bf81c79029ef6f2225901c9b385a010df9c147d25d28ffa1893a2a889cfac8f99a00158f81c740b638615e4afd050ca3f1ac9ec907fa0dc8
-
SSDEEP
3072:0m1TJiHjKZpub+tnBMZi1/cPWJOHN60heLrDXvns6/Dt:O4QdicPWJOY08Hjskh
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5a0dc73799c7acff2caf6e2dfb2972409e87b3c3e7ee6fea7523512bad826bb8.exe windows x86
99f0922107666544b27935aad2ad1f42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
exit
_cexit
_XcptFilter
__initenv
_c_exit
_stricmp
atoi
__getmainargs
_exit
_initterm
__setusermatherr
strrchr
sscanf
_strnicmp
strtoul
rewind
calloc
fgetc
tolower
_strcmpi
getenv
printf
isspace
fopen
_snprintf
strncpy
_iob
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fgets
fclose
sprintf
_spawnlp
_vsnprintf
kernel32
FormatMessageA
LocalAlloc
FreeLibrary
InterlockedExchange
GetModuleFileNameA
CreateEventA
GetModuleHandleA
SetPriorityClass
GetCurrentThread
GetCommandLineA
GetEnvironmentVariableA
SetConsoleCtrlHandler
GetCurrentProcess
DuplicateHandle
GetStdHandle
GetPriorityClass
CreateProcessA
SetStdHandle
SetLastError
GetVersionExA
LoadLibraryA
GetProcAddress
InitializeCriticalSection
RaiseException
CreateNamedPipeA
CreateFileA
GetLastError
AllocConsole
OutputDebugStringA
WriteFile
ExitProcess
InterlockedDecrement
ReadFile
GetCurrentProcessId
SetEvent
Sleep
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
WaitForSingleObject
CloseHandle
SetThreadPriority
CreateThread
dbgeng
DebugCreate
DebugConnect
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE