Behavioral task
behavioral1
Sample
7ae4147cb3a84ac540fbc554cef1227531a73d6bbbd5e9a1e3b9446b1d9817c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ae4147cb3a84ac540fbc554cef1227531a73d6bbbd5e9a1e3b9446b1d9817c9.exe
Resource
win10v2004-20220812-en
General
-
Target
7ae4147cb3a84ac540fbc554cef1227531a73d6bbbd5e9a1e3b9446b1d9817c9
-
Size
159KB
-
MD5
81bb5c25afbd487cdbd0579b9d3236bf
-
SHA1
5e90d3f7390187569944ce5cc649ce42a5cacfed
-
SHA256
7ae4147cb3a84ac540fbc554cef1227531a73d6bbbd5e9a1e3b9446b1d9817c9
-
SHA512
c0dcf3134a739030950667cf98057aa25150c74a53f2bfda38f6971d8289ae265beff1c8062240f291fcb6f260db85e1a1a3f9de3e1b9caa8ddd5d709f9c9791
-
SSDEEP
3072:IApvABlnp3qlDKQDVmYAFXkdPN85iZjLyVkJEZ0AzYP09HSv5:IRBJtwLAFXkdl85iZnyVkHAkP09Y5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7ae4147cb3a84ac540fbc554cef1227531a73d6bbbd5e9a1e3b9446b1d9817c9.exe windows x86
391d6e728af1c610709e5cec4850fb71
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
SetFileTime
_lclose
LocalAlloc
LocalFree
_lopen
_lread
GetLastError
_lwrite
_llseek
GetFileAttributesA
GetFileAttributesW
GetCurrentDirectoryW
GetTempPathW
WideCharToMultiByte
MultiByteToWideChar
FormatMessageW
WaitForSingleObject
CreateThread
GetACP
LoadLibraryA
GetProcAddress
SearchPathW
FindResourceW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
_lcreat
GetVersionExW
FreeLibrary
GetLocaleInfoW
CreateFileW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
FindResourceExW
LoadResource
SetLastError
lstrcmpA
GetStringTypeW
GetFileTime
lstrlenA
GlobalAlloc
GlobalFree
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
HeapSetInformation
SetThreadUILanguage
GetConsoleOutputCP
lstrcmpiW
lstrcmpiA
GetFullPathNameW
RaiseException
GetFullPathNameA
UnmapViewOfFile
IsDBCSLeadByte
msvcrt
_snprintf
_itoa
ferror
__badioinfo
_fileno
_lseeki64
_write
_isatty
bsearch
_wcsnicmp
isleadbyte
__mb_cur_max
__pioinfo
mbtowc
_controlfp
?terminate@@YAXXZ
memset
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__getmainargs
_errno
??3@YAXPAX@Z
memcpy
malloc
free
_vsnprintf
_wsetlocale
fflush
_iob
fputs
toupper
printf
_vsnwprintf
wcsncmp
_wcsicmp
ntdll
RtlUnwind
RtlMultiByteToUnicodeN
NlsMbCodePageTag
user32
CharLowerA
LoadStringA
CharToOemA
LoadStringW
cabinet
ord23
ord20
ord21
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE