Behavioral task
behavioral1
Sample
ae1557dd9c28bc8644f1372d4bab3ddf130d2802e09010c6fa9175c353d81107.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae1557dd9c28bc8644f1372d4bab3ddf130d2802e09010c6fa9175c353d81107.exe
Resource
win10v2004-20220901-en
General
-
Target
ae1557dd9c28bc8644f1372d4bab3ddf130d2802e09010c6fa9175c353d81107
-
Size
268KB
-
MD5
0e4c6ca64042c505150fe608ecc4c0c8
-
SHA1
c228c8a1fdfcd08bbc973db66bb9ec2c95676d42
-
SHA256
ae1557dd9c28bc8644f1372d4bab3ddf130d2802e09010c6fa9175c353d81107
-
SHA512
ee1e9d0b3ec3210d97b585e3c205d54a2c2fd33b3b6c11374631aa983530c10560ab77f328d7208fb5e3c19182883ad5b208dc70ddb1ee28284909da92f02725
-
SSDEEP
6144:kZj7JbvJhw+m/7kmt87wLPt2jEXLyU5MCSEUD:kZhw+mjLtI4ceLyU+C1i
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ae1557dd9c28bc8644f1372d4bab3ddf130d2802e09010c6fa9175c353d81107.exe windows x86
f61c9957ecd575baa0267b75896c458d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
LoadLibraryExW
VerifyVersionInfoW
GetModuleHandleW
SizeofResource
VerSetConditionMask
LockResource
GetLastError
FindResourceExW
FindResourceW
GetProcAddress
lstrlenW
GetCommandLineW
GetFileAttributesExW
FreeLibrary
GetModuleFileNameW
LoadResource
SystemTimeToFileTime
GetSystemTime
CompareFileTime
SetLastError
LocalAlloc
CloseHandle
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
WideCharToMultiByte
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
RtlUnwind
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InterlockedExchange
LoadLibraryA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
CreateFileA
ole32
CoCreateGuid
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE