Behavioral task
behavioral1
Sample
352a504c401a4ab89ff03599ae64a33e4e285e0c328932368b6b6a126edcf90d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
352a504c401a4ab89ff03599ae64a33e4e285e0c328932368b6b6a126edcf90d.exe
Resource
win10v2004-20220812-en
General
-
Target
352a504c401a4ab89ff03599ae64a33e4e285e0c328932368b6b6a126edcf90d
-
Size
132KB
-
MD5
048f63cdab1394da733d986ea939d3f4
-
SHA1
aa4308e076b3b363f94a3d9a87ace9789852635e
-
SHA256
352a504c401a4ab89ff03599ae64a33e4e285e0c328932368b6b6a126edcf90d
-
SHA512
0497b989c213f280f6112791f8195f79f24d8cd3674911581ab2166ea8989f781ba177c2a710c1814963930639afc9cccb2cc24110d7f6be23063e41cd7135d8
-
SSDEEP
3072:khGNNu8YjrL/5TqhU5JMspxw07VxXFrhMmWoAKHCf77Ur:kEu3BWejfpq0rXFrh9Wp94
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
352a504c401a4ab89ff03599ae64a33e4e285e0c328932368b6b6a126edcf90d.exe windows x86
77a9627b0bc5697d264f08a1b4bde73b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
MapViewOfFile
CreateFileMappingA
lstrcmpiA
GetTickCount
GetModuleFileNameA
CloseHandle
WinExec
MultiByteToWideChar
GetPrivateProfileStringA
GetFullPathNameA
GetWindowsDirectoryA
IsDBCSLeadByte
ExitProcess
LocalAlloc
LocalFree
GetFileAttributesA
SearchPathA
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
CharNextA
LoadIconA
SendMessageA
SetWindowLongA
IsWindow
PostMessageA
EnumWindows
PostQuitMessage
DefWindowProcA
CallWindowProcA
GetClassNameA
GetWindow
MessageBoxA
SetForegroundWindow
wsprintfA
LoadStringA
CharPrevA
GetActiveWindow
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
CharLowerA
FindWindowA
GetWindowLongA
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueA
RegDeleteValueA
ole32
CoCreateInstance
CoInitialize
comdlg32
GetOpenFileNameA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE