Behavioral task
behavioral1
Sample
578e14054ca1d3f39a3308e081217fe8a6c680c337ee2867482dab6a0fa6522a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
578e14054ca1d3f39a3308e081217fe8a6c680c337ee2867482dab6a0fa6522a.exe
Resource
win10v2004-20220812-en
General
-
Target
578e14054ca1d3f39a3308e081217fe8a6c680c337ee2867482dab6a0fa6522a
-
Size
153KB
-
MD5
a2a4b6fb88ad31f5ce4deeb45d6316e0
-
SHA1
95caaa2483a657f8bfe86d98dc9a2f796609ea69
-
SHA256
578e14054ca1d3f39a3308e081217fe8a6c680c337ee2867482dab6a0fa6522a
-
SHA512
8a6fb83d648e9706ee58689c77152a9969c5c28d51890c6e9cd37d146dffc583d9827a345f4ad2b707548ddb5b11449f59d08622620c9c55033eb1ff62633853
-
SSDEEP
3072:TH8uI5tKBXn8KPgo7cKaFCreLTgbkLWY0/64LTE7A2DjnnuG+j:JI5tKBtN7cKaFCZS44A2Djt+j
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
578e14054ca1d3f39a3308e081217fe8a6c680c337ee2867482dab6a0fa6522a.exe windows x86
fedd43f0df33d14f80a315cd2696b3d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
DeviceIoControl
LocalAlloc
CloseHandle
FreeEnvironmentStringsW
LoadLibraryA
GetProcAddress
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapAlloc
HeapFree
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineA
MultiByteToWideChar
lstrcpyA
FreeEnvironmentStringsA
SearchPathA
LocalFree
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
WinExec
lstrcmpA
CreateMutexA
GetLastError
TerminateProcess
ExitProcess
GetVersion
GetModuleHandleA
GetStartupInfoA
user32
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
LoadStringA
LoadImageA
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
SendMessageA
GetClassNameA
GetWindow
PostQuitMessage
DefWindowProcA
SetForegroundWindow
PostMessageA
CharUpperA
GetSysColor
SystemParametersInfoA
GetDC
GetMenuCheckMarkDimensions
ReleaseDC
CreatePopupMenu
InsertMenuItemA
GetCursorPos
TrackPopupMenu
DestroyMenu
gdi32
LineTo
CreatePen
DeleteDC
Rectangle
GetTextColor
DeleteObject
GetTextExtentPoint32A
SelectObject
CreateCompatibleDC
BitBlt
MoveToEx
CreateBrushIndirect
ExtTextOutA
CreateFontIndirectA
SetTextColor
GetBkMode
SetBkMode
GetTextAlign
SetTextAlign
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
shell32
Shell_NotifyIconA
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsA
SetupDiGetDeviceInstanceIdA
SetupDiEnumDeviceInterfaces
SetupDiEnumDeviceInfo
SetupDiGetDeviceInterfaceDetailA
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE