Behavioral task
behavioral1
Sample
b3b4e922ca6736366ef8151a3810342d713303f28975c8e6b732aa98c00acf86.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3b4e922ca6736366ef8151a3810342d713303f28975c8e6b732aa98c00acf86.exe
Resource
win10v2004-20221111-en
General
-
Target
b3b4e922ca6736366ef8151a3810342d713303f28975c8e6b732aa98c00acf86
-
Size
252KB
-
MD5
1213ee38943d1f66041c0278fde03d65
-
SHA1
6edde6b9a1cedcf53c573c60ed50617bb68fb56f
-
SHA256
b3b4e922ca6736366ef8151a3810342d713303f28975c8e6b732aa98c00acf86
-
SHA512
03619fcacb3ac5d5d0f5641dda81cee1b607fcbe21991751d033c24e676160363bbf7a3f48e67909fb1cd0f72ff37067aedc04b96161806190c6f0f5ce9562f3
-
SSDEEP
6144:NuV5N9ACzLRLFPZLgglGCmp+Nfxb7XX0topwo:cN9AYbPZLg9KNJPX6Qx
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b3b4e922ca6736366ef8151a3810342d713303f28975c8e6b732aa98c00acf86.exe windows x86
e700dd13fa2b8490b4add525363419b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
WriteFile
SetFilePointer
SetEndOfFile
DeleteFileW
ReadFile
GetFileSizeEx
LocalFree
CreateDirectoryW
GetFileAttributesW
ReleaseMutex
WaitForSingleObject
GetTimeFormatW
GetLocalTime
OutputDebugStringW
MapViewOfFile
CreateMutexW
GetModuleFileNameW
GetCommandLineW
CloseHandle
GetSystemDirectoryW
GetCurrentProcess
GetVersionExW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFileEx
CreateFileW
GetLastError
Sleep
GetModuleHandleW
GetProcAddress
GetProcessHeap
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
HeapSize
LoadLibraryA
HeapAlloc
HeapFree
RtlUnwind
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
ExitProcess
GetStdHandle
GetModuleFileNameA
RaiseException
GetModuleHandleA
LCMapStringW
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
user32
wsprintfW
advapi32
RegSetValueExW
AllocateAndInitializeSid
GetNamedSecurityInfoW
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
RegQueryInfoKeyW
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
shell32
SHGetFolderPathW
shlwapi
PathAppendW
PathIsNetworkPathW
PathStripToRootW
PathIsRelativeW
PathRemoveFileSpecW
PathStripPathW
PathSkipRootW
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE