Behavioral task
behavioral1
Sample
58bd31b50ef2b515bea18fc2c48b7fa6283f2d89d9ed81bf2d65c9d49628f640.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58bd31b50ef2b515bea18fc2c48b7fa6283f2d89d9ed81bf2d65c9d49628f640.exe
Resource
win10v2004-20220812-en
General
-
Target
58bd31b50ef2b515bea18fc2c48b7fa6283f2d89d9ed81bf2d65c9d49628f640
-
Size
321KB
-
MD5
34bcc57fd84b9f947a4a9b73d8a16530
-
SHA1
65a33041ec79c622416792c0c0b31a7a51b04c44
-
SHA256
58bd31b50ef2b515bea18fc2c48b7fa6283f2d89d9ed81bf2d65c9d49628f640
-
SHA512
e3d7195c4ab1a775794ed4714a1352c6afbc54da8cb8d8ce455286697699a783be0d53707e5ded1fbbc2189097f681e3867a70943cbefc89f1de8b8bb77093f0
-
SSDEEP
6144:Z3baay70UzAOAjBm4RTXBjDIW2xIVym1ca7uZ:ZWaVsmjnR9jVIIRcaY
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
58bd31b50ef2b515bea18fc2c48b7fa6283f2d89d9ed81bf2d65c9d49628f640.exe windows x86
bb5de69760967459493c09dcf1673769
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetParent
SetCursorPos
DestroyAcceleratorTable
CreateAcceleratorTableW
GetKeyboardState
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
ToUnicodeEx
MapVirtualKeyExW
IsCharLowerW
GetKeyboardLayout
GetSystemMenu
GetComboBoxInfo
ReuseDDElParam
UnpackDDElParam
GetMenuBarInfo
InsertMenuItemW
TranslateAcceleratorW
LoadAcceleratorsW
IntersectRect
BringWindowToTop
SetMenuItemBitmaps
IsMenu
GetKeyNameTextA
LoadImageW
SetMenuContextHelpId
GetKeyNameTextW
CloseClipboard
CallMsgFilterW
CopyRect
GetSysColorBrush
DlgDirListComboBoxA
SendMessageCallbackW
RegisterWindowMessageA
ReleaseDC
shell32
SHGetFolderPathW
SHCreateDirectoryExW
SHAddToRecentDocs
SHGetFileInfoW
SHGetPathFromIDListW
SHGetMalloc
FindExecutableW
SHGetSpecialFolderPathW
CommandLineToArgvW
SHBrowseForFolderW
SHAppBarMessage
DragFinish
DragQueryFileW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteW
ExtractAssociatedIconA
Shell_NotifyIconW
DoEnvironmentSubstW
ExtractIconW
Shell_NotifyIconA
ExtractIconA
ShellExecuteExW
ShellAboutW
advapi32
RegQueryValueW
RegSetValueW
RegCreateKeyW
GetUserNameW
OpenThreadToken
DuplicateTokenEx
CreateProcessAsUserW
GetLengthSid
RegQueryInfoKeyW
RegOpenKeyW
RegEnumValueW
RegDeleteValueW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegDeleteKeyW
LookupPrivilegeValueW
EqualSid
AdjustTokenPrivileges
GetTokenInformation
OpenProcessToken
LookupAccountNameW
LookupAccountSidW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegCloseKey
SetFileSecurityW
MapGenericMask
StartServiceCtrlDispatcherA
SetTokenInformation
RegEnumKeyW
RegUnLoadKeyW
RegSaveKeyA
GetFileSecurityW
gdi32
RestoreDC
RectVisible
PtVisible
PlayMetaFile
CreateCompatibleBitmap
SetROP2
SetPolyFillMode
GetLayout
SetLayout
SetMapMode
SetGraphicsMode
DeleteMetaFile
SelectPalette
ExtSelectClipRgn
GetTextColor
GdiFlush
SetViewportOrgEx
CreateDCA
GetBitmapBits
SetTextColor
SetBkMode
GetTextExtentPoint32W
GetStockObject
GetPixel
CreateMetaFileW
CloseMetaFile
GetTextFaceW
GetTextAlign
GetStretchBltMode
GetPolyFillMode
GetNearestColor
GetBkMode
GetROP2
SetAbortProc
AbortDoc
EndPage
StartPage
EndDoc
GetViewportOrgEx
LPtoDP
GetWindowOrgEx
GetBoundsRect
FillRgn
SetPaletteEntries
ExtFloodFill
SetPixelV
PtInRegion
FrameRgn
RoundRect
GetCharWidthW
CreateFontW
GetCurrentObject
OffsetRgn
EnumFontFamiliesExW
Rectangle
Polyline
Polygon
CreatePolygonRgn
Ellipse
CreateEllipticRgn
SetMapperFlags
GetObjectA
CheckColorsInGamut
AddFontResourceW
CreateBrushIndirect
CreateCompatibleDC
ChoosePixelFormat
AnimatePalette
CombineRgn
CreateColorSpaceA
ColorMatchToTarget
CreateDIBSection
Chord
SelectClipRgn
GdiAlphaBlend
CreateRectRgn
CreateRoundRectRgn
SetBkColor
GetTextMetricsW
CopyMetaFileW
CreateDCW
CreateBitmap
CreateDIBPatternBrushPt
CreateHatchBrush
CreatePen
CreatePatternBrush
Escape
ExcludeClipRect
GetClipBox
GetClipRgn
GetCurrentPositionEx
GetObjectType
GetViewportExtEx
GetWindowExtEx
IntersectClipRect
LineTo
OffsetClipRgn
CreateFontIndirectW
GetSystemPaletteEntries
GetDeviceCaps
GetObjectW
DeleteObject
SelectObject
BitBlt
CreateSolidBrush
DeleteDC
kernel32
HeapAlloc
HeapSize
HeapFree
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CompareStringA
CompareStringW
SetEnvironmentVariableA
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetTimeZoneInformation
TerminateProcess
SetNamedPipeHandleState
GetComputerNameW
FindFirstVolumeMountPointW
GetProcessIoCounters
EnumDateFormatsExW
GetProcessHeap
IsDebuggerPresent
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
VirtualAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
WideCharToMultiByte
Sections
.UPX1 Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 37.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ