Behavioral task
behavioral1
Sample
5aa51b0c98c695e8e726c60ed8fd8e7feb95f1d79b1f95ede611076e76915372.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5aa51b0c98c695e8e726c60ed8fd8e7feb95f1d79b1f95ede611076e76915372.exe
Resource
win10v2004-20220812-en
General
-
Target
5aa51b0c98c695e8e726c60ed8fd8e7feb95f1d79b1f95ede611076e76915372
-
Size
252KB
-
MD5
00eeb66ed0909a78b095dd911aa898eb
-
SHA1
f36286df2c781d0c138839326c4ae9ce4568673c
-
SHA256
5aa51b0c98c695e8e726c60ed8fd8e7feb95f1d79b1f95ede611076e76915372
-
SHA512
3c4d101503c79742a35345d91f0b0cc3f5505e94765ca4fe0319f5d3e01a255034c811bf1321a3b86b33e0d406d6256feb8b8afab5fce0f2375c67403b5dbd8d
-
SSDEEP
6144:V/dUU004AOfwx0koc9XseHWmZjL0ImJR:V/dUU004ltxwjL0ImD
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5aa51b0c98c695e8e726c60ed8fd8e7feb95f1d79b1f95ede611076e76915372.exe windows x86
8efb1c5d536b5f5190313c41eca2a513
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetACP
GetOEMCP
GetCPInfo
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetLastError
SetFilePointer
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
WideCharToMultiByte
GetTimeZoneInformation
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
CloseHandle
ReadFile
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
LoadLibraryA
RtlUnwind
InterlockedExchange
FlushFileBuffers
CreateFileA
GetLocaleInfoA
RaiseException
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE