Behavioral task
behavioral1
Sample
4a21a190c001a1c29e2efc6afce319d95686c2d5535d6b841c2869f9ce0945f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a21a190c001a1c29e2efc6afce319d95686c2d5535d6b841c2869f9ce0945f5.exe
Resource
win10v2004-20220812-en
General
-
Target
4a21a190c001a1c29e2efc6afce319d95686c2d5535d6b841c2869f9ce0945f5
-
Size
151KB
-
MD5
93c8b1f4c726720ec09ab6928fe30aa5
-
SHA1
6b048783aae85257e045cdef85ec616939dff9a9
-
SHA256
4a21a190c001a1c29e2efc6afce319d95686c2d5535d6b841c2869f9ce0945f5
-
SHA512
008a12ccfb092a6aeaa1c987d3c1b3bb94236819df694dda95e3030491b22b2973fb8674898858c47734795c2b6bac64efacb39c4ff365676232a3dfe2b1c27d
-
SSDEEP
3072:uxWtHNWDSj30X32tAl3d49ItNBsaQbuICBpH5Py5dM4mDdW4Btc:3tHwDytLdefH5z03
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4a21a190c001a1c29e2efc6afce319d95686c2d5535d6b841c2869f9ce0945f5.exe windows x86
62a0083cd310bc517cba0c17380b06aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetProcAddress
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
CreateFileW
SetFilePointer
GetLastError
CreateProcessW
GetCurrentProcessId
LoadLibraryW
FreeLibrary
FindFirstFileW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
FindNextFileW
FindClose
RemoveDirectoryW
lstrcpyW
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
ExitProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
Sleep
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
VirtualProtect
GetSystemInfo
FlushFileBuffers
CloseHandle
WriteFile
advapi32
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
user32
LoadStringW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHFileOperationW
msi
ord16
ord141
ole32
CoInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE