Behavioral task
behavioral1
Sample
aa8400440ade71111a512b073468978c0cd197f1acfc4aeb3083a7759abc9cd5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa8400440ade71111a512b073468978c0cd197f1acfc4aeb3083a7759abc9cd5.exe
Resource
win10v2004-20220901-en
General
-
Target
aa8400440ade71111a512b073468978c0cd197f1acfc4aeb3083a7759abc9cd5
-
Size
454KB
-
MD5
a2623c1dc19d09483306f90099d86bfc
-
SHA1
7365411c2d845efb66b22a85134b70356f882795
-
SHA256
aa8400440ade71111a512b073468978c0cd197f1acfc4aeb3083a7759abc9cd5
-
SHA512
fdb6de17873dae2650e9c16c9f2f7515e111179bbed7fa4384d6a0f54c3df1b993a5021f43d3bca74d79c4226e8c31b158b8576b85e5fd4c5abd64bbf8ea3932
-
SSDEEP
12288:yy3QPozshSbiXQpfe1pkMLvCdk5kHDMlNYu:y71gU1p9Cuifu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
aa8400440ade71111a512b073468978c0cd197f1acfc4aeb3083a7759abc9cd5.exe windows x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE