Behavioral task
behavioral1
Sample
f468d2ec5c90818e3a12148efaaea23be11e2eea8d09cfdc6b9ebf3599f43b1f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f468d2ec5c90818e3a12148efaaea23be11e2eea8d09cfdc6b9ebf3599f43b1f.exe
Resource
win10v2004-20220901-en
General
-
Target
f468d2ec5c90818e3a12148efaaea23be11e2eea8d09cfdc6b9ebf3599f43b1f
-
Size
640KB
-
MD5
037e9cb0e81488731391379e7a04da04
-
SHA1
1cff9f45c35569701a4b0d6e424a341511f40447
-
SHA256
f468d2ec5c90818e3a12148efaaea23be11e2eea8d09cfdc6b9ebf3599f43b1f
-
SHA512
064bf23f9991a5386e78f39db14379bb293069a3d146518ce83883ea7d0442e1e565803bc0a5a06e45c60381bc8f93f4c3da89eef09b8838bb0ab89660daab25
-
SSDEEP
12288:UR/JlTHvpcsPtSn+mCjSmZzTt9oYY+jFfuJXuLILqBLq57nov:U9Rp9oYNRupaEqBmJC
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f468d2ec5c90818e3a12148efaaea23be11e2eea8d09cfdc6b9ebf3599f43b1f.exe windows x86
e0f5ce5d9556cb83988ba0bd1ac053bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
getservbyport
WSAStartup
htons
ntohs
ntohl
htonl
gethostbyaddr
mpr
WNetGetConnectionA
comctl32
ImageList_SetBkColor
ImageList_Create
ord17
ord6
PropertySheetA
CreatePropertySheetPageA
CreateToolbarEx
ImageList_ReplaceIcon
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
GetSystemTimeAsFileTime
PulseEvent
WaitForMultipleObjects
SetPriorityClass
CreateEventA
InitializeCriticalSection
LoadLibraryA
GetCurrentProcessId
GetLocaleInfoA
OpenProcess
FindClose
FindFirstFileA
SetEnvironmentVariableA
CreateProcessA
SetProcessWorkingSetSize
FormatMessageA
DuplicateHandle
Sleep
TerminateProcess
ExpandEnvironmentStringsA
ReadProcessMemory
DeviceIoControl
DeleteFileA
GetDriveTypeA
WaitForSingleObject
TerminateThread
GetCurrentDirectoryA
GlobalMemoryStatus
VirtualFree
VirtualAlloc
GetFileTime
VirtualQueryEx
GetExitCodeThread
GetPriorityClass
GetSystemDirectoryA
GlobalAlloc
GlobalReAlloc
GetThreadContext
InterlockedIncrement
GetProcessAffinityMask
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
WriteFile
GetCurrentThread
TlsGetValue
TlsFree
TlsAlloc
FatalAppExitA
DeleteCriticalSection
IsBadWritePtr
HeapCreate
HeapDestroy
GetVersionExA
ExitProcess
GetCommandLineA
GetStartupInfoA
GetCurrentThreadId
ExitThread
TlsSetValue
CreateThread
ResumeThread
HeapReAlloc
RtlUnwind
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
lstrcpynA
GetFileAttributesA
lstrcmpA
WideCharToMultiByte
GetNumberFormatA
ReadFile
SetFilePointer
lstrcmpiA
SetEvent
GetDateFormatA
InterlockedDecrement
lstrcatA
MulDiv
GetEnvironmentVariableA
GetVersion
GetSystemInfo
GetModuleHandleA
GetProcAddress
SetLastError
CreateFileA
FindResourceA
LoadResource
SizeofResource
LockResource
GetCurrentProcess
GetLastError
CloseHandle
IsBadReadPtr
GetProcessHeap
HeapAlloc
HeapFree
GetEnvironmentStringsW
HeapSize
SetHandleCount
GetStdHandle
GetFileType
IsValidLocale
lstrcpyA
IsBadStringPtrA
lstrlenA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeFormatA
EnterCriticalSection
LeaveCriticalSection
LocalFree
LocalAlloc
GetModuleFileNameA
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
SetUnhandledExceptionFilter
LCMapStringW
UnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetConsoleCtrlHandler
SetEndOfFile
GetTimeZoneInformation
GetLocaleInfoW
CompareStringA
GlobalLock
CompareStringW
user32
GetDlgItemTextA
CreateDialogParamA
DispatchMessageA
IsDialogMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
ExitWindowsEx
SetWindowTextA
EnumWindows
GetClassNameA
SendMessageTimeoutA
GetWindow
GetUserObjectSecurity
SetUserObjectSecurity
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
MsgWaitForMultipleObjects
PeekMessageA
InsertMenuA
CheckMenuItem
DeleteMenu
RegisterWindowMessageA
ReleaseCapture
RedrawWindow
GetMenuCheckMarkDimensions
GetDesktopWindow
FindWindowExA
IsIconic
GetWindowThreadProcessId
GetWindowTextA
GetWindowDC
EnableWindow
CheckDlgButton
IsDlgButtonChecked
ModifyMenuA
CreatePopupMenu
AppendMenuA
TrackPopupMenuEx
RemoveMenu
GetMenuItemCount
GetMenuItemID
wsprintfA
GetMenu
EnableMenuItem
DestroyIcon
SetClassLongA
FillRect
DrawIconEx
GetDoubleClickTime
SetFocus
SetTimer
GetCursorPos
WindowFromPoint
SetMenuItemBitmaps
SendMessageA
LoadStringA
FindWindowA
PostMessageA
SetForegroundWindow
LoadIconA
LoadImageA
RegisterClassExA
RegisterClassA
UpdateWindow
MessageBoxA
CallWindowProcA
DrawFrameControl
ScreenToClient
PtInRect
GetWindowPlacement
RemovePropA
UnionRect
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
GetPropA
SetPropA
SetWindowLongA
IsWindow
GetWindowLongA
SetWindowPlacement
DefDlgProcA
DrawMenuBar
PostQuitMessage
TrackPopupMenu
GetCapture
DrawEdge
SetCapture
GetSubMenu
LoadBitmapA
DefFrameProcA
DefMDIChildProcA
BeginPaint
EndPaint
ShowWindow
ClientToScreen
GetSystemMetrics
SetWindowPos
DefWindowProcA
GetClientRect
DrawTextA
GetDC
ReleaseDC
MapWindowPoints
DestroyWindow
CreateWindowExA
GetParent
IsWindowVisible
GetFocus
EndDialog
GetWindowRect
MoveWindow
GetDlgItem
SetDlgItemTextA
LoadCursorA
GetSysColorBrush
GetSysColor
ChildWindowFromPoint
InvalidateRect
SetCursor
DialogBoxParamA
KillTimer
LoadMenuA
InvalidateRgn
gdi32
RestoreDC
SetTextAlign
ExtTextOutA
Rectangle
GetDeviceCaps
CreateSolidBrush
CreatePen
SetROP2
CreateCompatibleBitmap
SaveDC
GetTextMetricsA
StretchBlt
LineTo
GetTextExtentPoint32A
SetBkColor
CreateDIBSection
CreateCompatibleDC
BitBlt
DeleteDC
DeleteObject
GetStockObject
GetObjectA
CreateFontIndirectA
SetBkMode
MoveToEx
SelectObject
SetTextColor
comdlg32
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
ChooseFontA
advapi32
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenServiceA
CloseServiceHandle
IsValidSecurityDescriptor
SetKernelObjectSecurity
GetKernelObjectSecurity
OpenSCManagerA
RegConnectRegistryA
EqualSid
LookupAccountSidA
GetLengthSid
CopySid
RegEnumValueA
GetTokenInformation
RegDeleteValueA
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
MapGenericMask
LookupPrivilegeNameA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHBrowseForFolderA
Shell_NotifyIconA
ShellExecuteExA
ShellExecuteA
SHGetFileInfoA
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 316KB - Virtual size: 313KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 100KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE