Behavioral task
behavioral1
Sample
5d8305ff9ea0ccb94caf5fa76586ac88f17c0e7c672c791782ac9766c486877e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5d8305ff9ea0ccb94caf5fa76586ac88f17c0e7c672c791782ac9766c486877e.exe
Resource
win10v2004-20220812-en
General
-
Target
5d8305ff9ea0ccb94caf5fa76586ac88f17c0e7c672c791782ac9766c486877e
-
Size
419KB
-
MD5
0ac1b9ba209b3dc3022e6c13561b74d0
-
SHA1
d3df11b14970d01301f61324dc6cd6da9f4db3c1
-
SHA256
5d8305ff9ea0ccb94caf5fa76586ac88f17c0e7c672c791782ac9766c486877e
-
SHA512
c82473e775e795e3525278fe6baead1bf0b0b309b6d6dfcfc03a3b949965043113b2ffdb690dad4ac12358f0f1f2c83e092ff4f6caa0d9c6b39ff96f1c7d39ba
-
SSDEEP
12288:YHLz6nGKAhq+2jLEib31xRarDHA4Cno9YAe3Ji:Yrz6b+2nzlxRoHoncYj
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5d8305ff9ea0ccb94caf5fa76586ac88f17c0e7c672c791782ac9766c486877e.exe windows x86
16dc6faeea2193701a7d2b57debe5bc3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyW
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
RegNotifyChangeKeyValue
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
kernel32
FindResourceExW
GetModuleHandleW
CloseHandle
OpenProcess
TerminateProcess
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
GetLastError
CreateMutexW
CreateEventW
MultiByteToWideChar
FindResourceW
WideCharToMultiByte
GetPrivateProfileIntW
GetPrivateProfileStringW
CompareStringW
GetPrivateProfileSectionNamesW
WriteFile
CreateFileW
GetLocalTime
SetFilePointer
CreateDirectoryW
lstrlenA
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetUserDefaultLCID
GetUserDefaultUILanguage
lstrlenW
lstrcmpW
InterlockedExchange
GetModuleFileNameW
GetStringTypeExW
GetTickCount
DeleteFileW
GetTempFileNameW
GetTempPathW
LoadResource
LockResource
SizeofResource
HeapSetInformation
LoadLibraryW
GetProcAddress
FreeLibrary
GetCommandLineW
MulDiv
GetConsoleMode
GetConsoleCP
GetLocaleInfoW
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
ExitProcess
Sleep
GetSystemTimeAsFileTime
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
SearchPathW
UnmapViewOfFile
GetVersionExW
CreateFileMappingW
HeapFree
HeapAlloc
HeapDestroy
DeleteCriticalSection
InitializeCriticalSection
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
LoadLibraryExW
MapViewOfFile
gdi32
GetTextExtentPoint32W
GetObjectW
SelectObject
CreateFontIndirectW
DeleteObject
SetTextColor
SetBkColor
CreateSolidBrush
user32
GetSystemMenu
RemoveMenu
SetDlgItemTextW
LoadIconW
CheckRadioButton
GetSystemMetrics
LoadImageW
OffsetRect
MapWindowPoints
DrawTextW
GetSysColorBrush
GetSysColor
GetDlgItem
IsDlgButtonChecked
CheckDlgButton
IsWindowEnabled
ReleaseDC
GetDC
GetClientRect
GetWindowRect
SetWindowPos
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SendMessageW
EndDialog
PeekMessageW
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageW
GetActiveWindow
CreateWindowExW
RegisterClassExW
GetWindowLongW
CallWindowProcW
DefWindowProcW
PostQuitMessage
LoadCursorW
GetClassInfoExW
KillTimer
SetTimer
PostMessageW
DestroyWindow
LoadStringW
FindWindowW
SetForegroundWindow
DialogBoxParamW
IsWindow
ShowWindow
IsIconic
SetWindowLongW
EnableWindow
UnregisterClassA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
shlwapi
UrlCreateFromPathW
PathIsRelativeW
PathCanonicalizeW
PathAddBackslashW
AssocQueryStringW
PathRemoveBlanksW
PathRemoveFileSpecW
PathAppendW
shell32
SHGetFolderPathAndSubDirW
Shell_NotifyIconW
psapi
GetProcessImageFileNameW
EnumProcesses
wininet
InternetCreateUrlW
InternetOpenW
InternetCloseHandle
InternetCrackUrlW
InternetOpenUrlW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE