Behavioral task
behavioral1
Sample
6c980066a13410580e3647317e0f7c3a5da74652f5a76745d54742b99eb2dc93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c980066a13410580e3647317e0f7c3a5da74652f5a76745d54742b99eb2dc93.exe
Resource
win10v2004-20220812-en
General
-
Target
6c980066a13410580e3647317e0f7c3a5da74652f5a76745d54742b99eb2dc93
-
Size
371KB
-
MD5
0d4070e6067d3b3b870add80e3e145c0
-
SHA1
5ee45c9db2ed7fbf0b68ef91c3b0ad2217ea187e
-
SHA256
6c980066a13410580e3647317e0f7c3a5da74652f5a76745d54742b99eb2dc93
-
SHA512
03cdc06c981d8ffda2330adf74d5e4ceb79e46c8ca24c87c770a89a4bbb574ccb970c5c27ae2a5f302417a5a2ff83ff680f34ee46f8ffb5db52f51fedff4c428
-
SSDEEP
3072:YD9inOh2wQntiUvXMwOCQm088bplhhxs2wV85MsnsNWseDuTxngwUY:c94Oh2wGzMRUqlhh5rnsNjeDER
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6c980066a13410580e3647317e0f7c3a5da74652f5a76745d54742b99eb2dc93.exe windows x86
a41938e5fef0f689de649cb84c43aa60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
libcurl
curl_formfree
curl_slist_free_all
curl_easy_cleanup
curl_easy_getinfo
curl_easy_perform
curl_easy_setopt
curl_slist_append
curl_easy_init
curl_formadd
common
?MakeMD5Value@common@talk@@YA?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@ABV34@@Z
?CString_to_MBCS@common@talk@@YAHABV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z
?Int2CString@common@talk@@YA?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@H@Z
?GetAppPath@common@talk@@YA?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@XZ
?CrashReporterCmdDecrypt@common@talk@@YAHABV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@AAV34@11111@Z
?MBCS_to_CString@common@talk@@YAHPBDAAV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@@Z
mfc100u
ord7973
ord7929
ord2407
ord1298
ord3202
ord1310
ord4290
ord13047
ord3985
ord5828
ord8347
ord9333
ord5143
ord11159
ord2852
ord2951
ord2952
ord3491
ord11116
ord2339
ord5276
ord12557
ord10725
ord6156
ord13388
ord7109
ord13382
ord2665
ord3992
ord14067
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4805
ord4425
ord4388
ord1519
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord11163
ord8112
ord13380
ord10937
ord3402
ord11081
ord8277
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord2417
ord7385
ord2884
ord2887
ord12606
ord5556
ord2756
ord2980
ord2981
ord10412
ord10058
ord8179
ord11123
ord2614
ord5264
ord285
ord2629
ord895
ord1295
ord1312
ord6704
ord11846
ord4088
ord421
ord979
ord10960
ord5231
ord2528
ord6144
ord9499
ord11237
ord7871
ord12951
ord10081
ord1212
ord788
ord9525
ord6711
ord1934
ord1905
ord296
ord381
ord7624
ord7548
ord11784
ord13854
ord4744
ord2164
ord11476
ord11477
ord13381
ord7108
ord13387
ord8530
ord3684
ord3625
ord11864
ord7126
ord1739
ord14162
ord10976
ord13267
ord11469
ord7179
ord13570
ord13567
ord13572
ord13569
ord13571
ord13568
ord3416
ord5261
ord11228
ord11236
ord4086
ord7391
ord9498
ord11240
ord11209
ord11845
ord4642
ord4923
ord5115
ord8483
ord4901
ord5118
ord4645
ord4794
ord4623
ord6931
ord6932
ord6922
ord4792
ord7393
ord9328
ord8346
ord6140
ord948
ord3627
ord902
ord286
ord12753
ord7176
ord1292
ord890
ord6869
ord2089
ord9447
ord1300
ord4396
msvcr100
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
_initterm
_exit
_cexit
__wgetmainargs
_amsg_exit
??0exception@std@@QAE@ABQBD@Z
_XcptFilter
exit
__set_app_type
__CxxFrameHandler3
memcpy
_CxxThrowException
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
printf
malloc
free
memmove
vsprintf
_localtime64
_wcmdln
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_time64
kernel32
GetStartupInfoW
HeapSetInformation
DecodePointer
InterlockedCompareExchange
InterlockedExchange
LoadLibraryA
GetProcAddress
GetModuleHandleW
EncodePointer
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
Sleep
user32
GetClientRect
DrawIcon
LoadBitmapW
EnableWindow
PostMessageW
GetSystemMetrics
SendMessageW
IsIconic
LoadIconW
MessageBoxW
shell32
ShellExecuteW
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE