Behavioral task
behavioral1
Sample
be40c44cb917c1434b500e2160aa1e2d4fa9b17b11767f27e84b403466ee598e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
be40c44cb917c1434b500e2160aa1e2d4fa9b17b11767f27e84b403466ee598e.exe
Resource
win10v2004-20220901-en
General
-
Target
be40c44cb917c1434b500e2160aa1e2d4fa9b17b11767f27e84b403466ee598e
-
Size
240KB
-
MD5
82808e60e6eeef521f09856a0e758ca6
-
SHA1
6f7057e0727ef0e5e220aa6c86f4b733d0d60bed
-
SHA256
be40c44cb917c1434b500e2160aa1e2d4fa9b17b11767f27e84b403466ee598e
-
SHA512
87421e8a5f6a1ed606a04de442ab35a98fa12ae5e87141e15df97660feec2170d5a22cf8a04a118caac55312a1bb069cf5e81d10b1cc931ee55efa6b13e0a742
-
SSDEEP
6144:SjzOsQWQ5/dR+SOVT+ltLjbwOEEFXSw0br:hRvUS2fzEFCn
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
be40c44cb917c1434b500e2160aa1e2d4fa9b17b11767f27e84b403466ee598e.exe windows x86
e3f97cfb18135dbbd85462a63347ca6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord6
comdlg32
CommDlgExtendedError
GetSaveFileNameA
GetOpenFileNameA
shell32
DragFinish
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
DragQueryFileA
DragAcceptFiles
ShellExecuteA
kernel32
GetUserDefaultLCID
IsValidLocale
GetSystemDefaultLCID
GetProcAddress
LoadLibraryA
CreateThread
GetWindowsDirectoryA
GetVersionExA
OpenFile
InterlockedDecrement
HeapCreate
CreateMutexA
OpenMutexA
WriteFile
GetCurrentProcess
GetModuleHandleA
GetModuleFileNameA
GetCurrentThreadId
InterlockedIncrement
GetVersion
GetLocaleInfoA
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
CreateFileA
CloseHandle
LoadLibraryExA
FindResourceA
LoadResource
GetLastError
SizeofResource
FreeLibrary
lstrlenW
lstrcpynA
lstrcmpiA
lstrlenA
SetFilePointer
GetSystemDirectoryA
FlushInstructionCache
GlobalLock
GlobalUnlock
lstrcatA
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
lstrcpyA
EnterCriticalSection
GetFileAttributesA
GetCurrentDirectoryA
GetOEMCP
GetEnvironmentStringsW
GetEnvironmentStrings
GetCPInfo
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
ExitProcess
HeapFree
TerminateProcess
HeapReAlloc
GetCommandLineA
HeapAlloc
GetACP
GetStartupInfoA
SetHandleCount
GetStdHandle
GetFileType
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
VirtualFree
RtlUnwind
VirtualAlloc
HeapSize
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
FlushFileBuffers
user32
SetWindowPos
IsWindow
GetClientRect
InvalidateRect
SetFocus
PeekMessageA
TranslateMessage
DispatchMessageA
LoadStringA
CharNextA
RedrawWindow
CreateWindowExA
GetWindowPlacement
SetForegroundWindow
LoadAcceleratorsA
EndDialog
SetDlgItemTextA
GetDlgItemTextA
GetWindow
MessageBoxA
FindWindowA
IsIconic
GetMessageA
IsClipboardFormatAvailable
PostMessageA
LoadMenuA
EnableMenuItem
SetActiveWindow
GetDesktopWindow
GetSysColor
DialogBoxParamA
GetActiveWindow
CharPrevA
SendDlgItemMessageA
SendMessageA
MapWindowPoints
SystemParametersInfoA
GetWindowRect
GetWindowLongA
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
DefWindowProcA
CallWindowProcA
BringWindowToTop
UpdateWindow
DefMDIChildProcA
GetMenuItemCount
DrawMenuBar
GetParent
IsWindowVisible
SetWindowTextA
AdjustWindowRectEx
EnableWindow
PostQuitMessage
MoveWindow
DefFrameProcA
TranslateMDISysAccel
TranslateAcceleratorA
DestroyWindow
LoadImageA
ShowWindow
GetSubMenu
CheckMenuItem
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
ole32
CoInitialize
CoRegisterClassObject
CoUninitialize
CoCreateInstance
CoRevokeClassObject
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
GetHGlobalFromStream
CreateStreamOnHGlobal
oleaut32
VariantInit
LoadTypeLi
RegisterTypeLi
SetErrorInfo
LoadRegTypeLi
VarI4FromStr
VariantChangeType
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysAllocStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE