Behavioral task
behavioral1
Sample
9c7b6a8738725b3dc87f836f7cdf2dec889a3e2f7fea72bb032cbd176923df22.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c7b6a8738725b3dc87f836f7cdf2dec889a3e2f7fea72bb032cbd176923df22.exe
Resource
win10v2004-20220812-en
General
-
Target
9c7b6a8738725b3dc87f836f7cdf2dec889a3e2f7fea72bb032cbd176923df22
-
Size
712KB
-
MD5
0f47998994962876730ebb6e80e295fd
-
SHA1
77626c7e617ddbaeb508e9da91e981d70ae9ba6a
-
SHA256
9c7b6a8738725b3dc87f836f7cdf2dec889a3e2f7fea72bb032cbd176923df22
-
SHA512
0e7073c1b98cccb4a8f512029dd768d3a54b0ca730fb1149d792cec9b46ff8f66e955bfb322cf3f1633a605946d09199ba62920bf443e907d3c36627d0cac31a
-
SSDEEP
6144:x/tpSp2lwDZfzj00sEOZFsjyxOzPuf7Qn6xqE3HGaplGoi/FSUMs3bYu:Z02lw1fzjiEOZFsjyxAkVxjdpY5kfu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9c7b6a8738725b3dc87f836f7cdf2dec889a3e2f7fea72bb032cbd176923df22.exe windows x86
b8c0a5d78763d68f09e6b6b2320cafe5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
winmm
joyGetPosEx
kernel32
GetFileTime
GetFileSize
GetFileAttributesA
FindResourceExA
WritePrivateProfileStringA
FileTimeToSystemTime
FileTimeToLocalFileTime
SetErrorMode
RtlUnwind
GetOEMCP
GetLocalTime
HeapFree
HeapReAlloc
HeapAlloc
GetStartupInfoA
ExitProcess
RaiseException
TerminateProcess
SetStdHandle
GetFileType
GetCPInfo
LocalReAlloc
GetProcessVersion
LeaveCriticalSection
TlsGetValue
GetSystemTime
GetTimeZoneInformation
TlsSetValue
GlobalUnlock
VirtualAlloc
IsBadWritePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetDriveTypeA
GetACP
HeapSize
EnterCriticalSection
GetDiskFreeSpaceA
GetVolumeInformationA
GetTempPathA
GlobalMemoryStatus
CreateMutexA
GetUserDefaultLangID
GlobalReAlloc
DeleteCriticalSection
TlsFree
GlobalHandle
LocalAlloc
TlsAlloc
InitializeCriticalSection
FindNextFileA
SizeofResource
GlobalFlags
GlobalAlloc
LocalFree
lstrcmpA
GetModuleFileNameA
VirtualProtect
MulDiv
FindFirstFileA
GetFullPathNameA
lstrcpynA
FindClose
LockFile
SetEndOfFile
UnlockFile
LCMapStringA
LCMapStringW
WriteFile
GetCommandLineA
GetProfileIntA
FlushFileBuffers
SetFilePointer
GetEnvironmentVariableA
GetCurrentProcess
SearchPathA
ReadFile
CreateFileA
lstrlenA
DuplicateHandle
MultiByteToWideChar
GetVersion
InterlockedDecrement
InterlockedIncrement
GlobalGetAtomNameA
lstrcatA
GetCurrentThreadId
GlobalFindAtomA
lstrcmpiA
GlobalAddAtomA
GlobalLock
GlobalDeleteAtom
lstrcpyA
HeapDestroy
GlobalFree
FreeLibrary
LockResource
FindResourceA
LoadResource
WideCharToMultiByte
CloseHandle
OpenProcess
GetModuleHandleA
Sleep
GetSystemInfo
GetVersionExA
OutputDebugStringA
GetWindowsDirectoryA
ExpandEnvironmentStringsA
SetThreadPriority
GetCurrentThread
GetTickCount
GetLogicalDriveStringsA
HeapCreate
VirtualFree
LoadLibraryA
GetProfileStringA
SetLastError
GetLastError
CreateProcessA
SetCurrentDirectoryA
GetSystemDirectoryA
GetCurrentDirectoryA
GetProcAddress
user32
ModifyMenuA
SetMenuItemBitmaps
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
GetMenuState
CharUpperA
ClientToScreen
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GetAsyncKeyState
MapDialogRect
PostQuitMessage
SetCursor
GetCursorPos
ValidateRect
GetMessageA
WaitMessage
KillTimer
SetTimer
GetClassNameA
PtInRect
LoadCursorA
GetSysColorBrush
GrayStringA
DestroyMenu
EnableMenuItem
InvalidateRect
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
GetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
IsWindowVisible
ShowWindow
InflateRect
LoadStringA
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetKeyboardType
EnumDisplaySettingsA
GetDesktopWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetWindowRect
LoadIconA
MessageBoxA
GetForegroundWindow
SetCapture
SetFocus
ReleaseCapture
SetActiveWindow
PeekMessageA
TranslateMessage
DispatchMessageA
GetDC
LoadImageA
SetWindowTextA
IsDialogMessageA
MessageBeep
GetParent
SendMessageA
GetTopWindow
EnableWindow
CreateWindowExA
GetPropA
UnhookWindowsHookEx
DrawFocusRect
DefDlgProcA
ExcludeUpdateRgn
HideCaret
UnregisterClassA
CharNextA
IsWindowUnicode
ShowCaret
gdi32
CreateDIBitmap
GetBitmapBits
GetDeviceCaps
GetBitmapDimensionEx
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
IntersectClipRect
DeleteObject
CreateSolidBrush
RectVisible
TextOutA
PtVisible
Escape
PatBlt
ExtTextOutA
EnumFontFamiliesExA
GetTextExtentPointA
BitBlt
CreateCompatibleDC
SetBitmapBits
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegEnumValueA
RegQueryValueExA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
comctl32
CreatePropertySheetPageA
PropertySheetA
DestroyPropertySheetPage
ord17
ImageList_Destroy
ole32
CoUninitialize
CoCreateInstance
CoInitialize
wsock32
ntohs
inet_addr
WSAGetLastError
ioctlsocket
bind
gethostbyname
htonl
closesocket
WSASetLastError
recv
send
WSAAsyncSelect
inet_ntoa
socket
recvfrom
sendto
connect
WSAStartup
WSACleanup
select
accept
htons
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE