Behavioral task
behavioral1
Sample
16405ed8401933e4ff488c6d2cde530a8b105eac75ccd9921354a6ebb1e16d18.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
16405ed8401933e4ff488c6d2cde530a8b105eac75ccd9921354a6ebb1e16d18.exe
Resource
win10v2004-20220812-en
General
-
Target
16405ed8401933e4ff488c6d2cde530a8b105eac75ccd9921354a6ebb1e16d18
-
Size
189KB
-
MD5
355b3fa461a5e927681b716f9d4de450
-
SHA1
cfebc9d108206a3b095d828e512e14d60f7a0140
-
SHA256
16405ed8401933e4ff488c6d2cde530a8b105eac75ccd9921354a6ebb1e16d18
-
SHA512
b13079d823424c7752138bd68c5329b3a391d1114a80d1bcb0b4ca0c408949d3937c53eb51bddd544c92eecb9fa4150909e65c6f4dcbff39da79092901937004
-
SSDEEP
3072:gRq4X6LBQmpdQKpiffn2E/HMsV83S/Cer6T2iyVU+MDPIt+Xt9c90msHLQHL4:gY5hlpEnAiUS/CJT57+MDgIG50K
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
16405ed8401933e4ff488c6d2cde530a8b105eac75ccd9921354a6ebb1e16d18.exe windows x86
1ec7472e7b6b37fd6f942993674bbe7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ReportEventW
RegSetValueExW
SetServiceStatus
RegEnumKeyExW
QueryTraceW
CreateProcessAsUserW
UpdateTraceW
DeregisterEventSource
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
RegisterEventSourceW
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
StopTraceW
EnableTrace
StartTraceW
WmiNotificationRegistrationW
kernel32
FormatMessageW
LoadLibraryW
lstrcpyW
HeapFree
lstrlenW
HeapAlloc
GetProcessHeap
CloseHandle
GetLastError
CreateFileW
SetErrorMode
ExpandEnvironmentStringsW
SystemTimeToFileTime
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
lstrcmpiW
CreateDirectoryW
GetFullPathNameW
lstrcpynW
CreateProcessW
SetEvent
CreateThread
CreateEventW
GetSystemTimeAsFileTime
DeleteCriticalSection
FreeLibrary
ResetEvent
Sleep
InitializeCriticalSection
GetModuleHandleW
lstrcatW
SetLastError
SetThreadPriority
GetCurrentThread
GetModuleHandleA
GetCommandLineA
GetVersionExA
WideCharToMultiByte
ExitProcess
GetProcAddress
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MultiByteToWideChar
LCMapStringA
LCMapStringW
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
SetFilePointer
SetStdHandle
FlushFileBuffers
WaitForMultipleObjects
user32
LoadStringW
ntdll
NtWaitForSingleObject
NtWaitForMultipleObjects
netapi32
NetMessageBufferSend
shlwapi
ord439
pdh
PdhPlaGetLogFileNameW
PdhPlaGetInfoW
PdhiPlaRunAs
PdhSetDefaultRealTimeDataSource
PdhAddCounterW
PdhAdd009CounterW
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhCloseQuery
PdhOpenQueryH
PdhGetLogFileSize
PdhCloseLog
PdhUpdateLogW
PdhOpenLogW
PdhExpandWildCardPathW
PdhParseCounterPathW
PdhiPlaFormatBlanksW
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE