Behavioral task
behavioral1
Sample
aebbe6277b5bd60e396286d5fbd8ada16328c0f79299374c937b4d3190957bef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aebbe6277b5bd60e396286d5fbd8ada16328c0f79299374c937b4d3190957bef.exe
Resource
win10v2004-20220812-en
General
-
Target
aebbe6277b5bd60e396286d5fbd8ada16328c0f79299374c937b4d3190957bef
-
Size
304KB
-
MD5
3a78332b8d7272db2274915a19912670
-
SHA1
ee440aed1dabc52142d2968b8353a3631b473e63
-
SHA256
aebbe6277b5bd60e396286d5fbd8ada16328c0f79299374c937b4d3190957bef
-
SHA512
5d11557f15fd0b0f0e0f2716d43c4541eba48810e69cd4d93f4d9c3791908d8e1139deb43f01851b12d5552d12fdcdfe49640e3d7c321e8f8829c41d59f207d4
-
SSDEEP
6144:lucRjo6OjM5FclRDvO4SIA1AT+UBiPVCi55bdbP9GwCUKMCux:RRjoOObDvJAmTs9C+hGaCk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
aebbe6277b5bd60e396286d5fbd8ada16328c0f79299374c937b4d3190957bef.exe windows x86
1fe332c3e902ad97027f3cb4769c641d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
ExpandEnvironmentStringsW
GetCurrentProcess
GetVersionExW
GetProcAddress
LoadLibraryW
FreeLibrary
GetFileAttributesW
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
CreateFileW
FindFirstFileW
FindClose
GetModuleFileNameW
GetCurrentDirectoryW
GetFullPathNameW
lstrlenW
ReadFile
SetFilePointer
InterlockedExchange
Sleep
GetComputerNameW
LoadLibraryA
GetFileSizeEx
GetACP
InterlockedCompareExchange
GetStartupInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CloseHandle
user32
LoadIconW
GetDesktopWindow
advapi32
GetUserNameW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ole32
OleInitialize
CoTaskMemFree
OleUninitialize
msvcr80
_wcsicmp
wcsncpy
_controlfp_s
memset
wcsrchr
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_decode_pointer
_onexit
memcpy
_lock
__dllonexit
_unlock
__set_app_type
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
?what@exception@std@@UBEPBDXZ
strlen
??0exception@std@@QAE@XZ
memcpy_s
??2@YAPAXI@Z
memmove_s
??_V@YAXPAX@Z
_invalid_parameter_noinfo
wcsstr
wcschr
_CxxThrowException
__CxxFrameHandler3
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE