Behavioral task
behavioral1
Sample
a1f1d937926629db344a2dcebcb1286a014626a871421e6c79c76ffcc0a73406.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1f1d937926629db344a2dcebcb1286a014626a871421e6c79c76ffcc0a73406.exe
Resource
win10v2004-20220812-en
General
-
Target
a1f1d937926629db344a2dcebcb1286a014626a871421e6c79c76ffcc0a73406
-
Size
112KB
-
MD5
8279bac921ae46ef605ca8327c9548d0
-
SHA1
6526a6acb221d556822748d533f0eaa0503654a5
-
SHA256
a1f1d937926629db344a2dcebcb1286a014626a871421e6c79c76ffcc0a73406
-
SHA512
732b5ba113264be927b5aca6f869c17dd15696613f00852b26e21aedb94defbfb28bd2a0183b6bb9734fc6ac60bc7cfd806f56c34da6027a57ace149204becc0
-
SSDEEP
1536:NdSch5mE7y3lZYPr7AzOdubC0uTI7K1K7YvaQZd+ro+Pzx3LrYr:NdNX63wPPMOdubCfT8UK7nX7pY
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a1f1d937926629db344a2dcebcb1286a014626a871421e6c79c76ffcc0a73406.exe windows x86
93b3c6d0a93df14cb05007e6cc0a77e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
kernel32
GetModuleHandleA
CreateEventA
CreateFileA
Sleep
DeviceIoControl
CloseHandle
ResetEvent
GetProcAddress
WaitForSingleObject
LoadLibraryA
FreeLibrary
GetStartupInfoA
Sections
.text Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE