Behavioral task
behavioral1
Sample
74f44b8565a49661fc62ae1b6d2cb18917fa93d60576944377468e62036d123c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74f44b8565a49661fc62ae1b6d2cb18917fa93d60576944377468e62036d123c.exe
Resource
win10v2004-20220812-en
General
-
Target
74f44b8565a49661fc62ae1b6d2cb18917fa93d60576944377468e62036d123c
-
Size
520KB
-
MD5
0d5a15c6179408dcb0b0b1af3b39d030
-
SHA1
fbba7d43af2c74668350672a4302d52b56d2e3c9
-
SHA256
74f44b8565a49661fc62ae1b6d2cb18917fa93d60576944377468e62036d123c
-
SHA512
386e4cc74c063d1b2fa7c6147844ea81d41786d301b25e1849d37a6876986144297a64a34c31923ed129834ac80bf67fee13e0209284e0071c6de0acf16eea35
-
SSDEEP
12288:lebeVhm34aSATrEi4TwtMbDvJAmTs9C+hGaCk:l4Ihm7SATrx4TwYW4Dk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
74f44b8565a49661fc62ae1b6d2cb18917fa93d60576944377468e62036d123c.exe windows x86
0cbffe118eb51dfca13f022f24e41117
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dbghelp
MiniDumpWriteDump
wininet
HttpEndRequestA
InternetWriteFile
InternetOpenA
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetCloseHandle
HttpSendRequestExA
rpcrt4
UuidCreate
iphlpapi
GetAdaptersInfo
kernel32
CloseHandle
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
FreeLibrary
lstrlenW
GetProcAddress
GetModuleHandleW
lstrcmpiW
RaiseException
GetLastError
MultiByteToWideChar
LoadLibraryExW
InterlockedDecrement
InterlockedIncrement
OpenProcess
GetProcessTimes
SetCurrentDirectoryW
GetTempPathW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
FlushInstructionCache
SetLastError
MulDiv
VirtualQueryEx
CreateFileW
DeleteFileW
OpenFileMappingW
ReadProcessMemory
GetPrivateProfileStringW
WriteFile
GetFileSize
ReadFile
WideCharToMultiByte
GetVolumeInformationW
GlobalAlloc
GlobalFree
SetErrorMode
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
GetComputerNameW
CreateProcessW
FileTimeToSystemTime
GetCurrentThreadId
GetConsoleMode
GetCommandLineW
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCurrentDirectoryA
GetFullPathNameW
GetModuleFileNameA
GetStdHandle
HeapCreate
GetDateFormatA
GetTimeFormatA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetTimeZoneInformation
ExitProcess
Sleep
LCMapStringW
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
GetStartupInfoW
GetModuleFileNameW
DeleteCriticalSection
FindFirstFileW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
GetProcessHeap
HeapAlloc
SystemTimeToTzSpecificLocalTime
SetUnhandledExceptionFilter
FlushFileBuffers
LCMapStringA
SetEndOfFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDriveTypeA
CreateFileA
CompareStringA
CompareStringW
GetDriveTypeW
FileTimeToLocalFileTime
FindClose
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetFileAttributesW
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
VirtualAlloc
SetEnvironmentVariableA
GetConsoleCP
VirtualFree
IsProcessorFeaturePresent
HeapDestroy
HeapReAlloc
HeapSize
InterlockedCompareExchange
LoadLibraryA
user32
EndDialog
CreateWindowExW
IsWindow
CreateDialogParamW
DrawIconEx
ScreenToClient
BeginPaint
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
EnableWindow
LoadIconW
LoadImageW
GetSystemMetrics
UnregisterClassA
GetWindowTextLengthW
GetWindowTextW
SetWindowLongW
InvalidateRect
SetWindowPos
MapWindowPoints
GetWindowRect
RedrawWindow
SendMessageW
IsWindowVisible
GetWindowLongW
ShowWindow
GetDlgItem
DialogBoxParamW
DestroyIcon
DestroyWindow
GetActiveWindow
CharNextW
SetWindowTextW
SetDlgItemTextW
EndPaint
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameW
CryptReleaseContext
CryptDecrypt
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptAcquireContextW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
SHGetFolderPathW
ord165
ole32
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocStringLen
VarBstrCmp
SysAllocString
SysFreeString
VarUI4FromStr
imm32
ImmDisableIME
psapi
GetModuleFileNameExW
Sections
.text Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE