Behavioral task
behavioral1
Sample
18cb83aae77f7ec169671a8034968dd9d496b94f1ccd94b60092ddfbd299df00.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
18cb83aae77f7ec169671a8034968dd9d496b94f1ccd94b60092ddfbd299df00.exe
Resource
win10v2004-20220812-en
General
-
Target
18cb83aae77f7ec169671a8034968dd9d496b94f1ccd94b60092ddfbd299df00
-
Size
250KB
-
MD5
507df0b78d92d2c5a35b3b4e35220070
-
SHA1
d4711db1478733d714e127a014e097a325945735
-
SHA256
18cb83aae77f7ec169671a8034968dd9d496b94f1ccd94b60092ddfbd299df00
-
SHA512
8a91e9648cd79f86442e5c2a48b1e89ae1e9d6d338767493883fab2ff81713fc104ee8638f54c2d63f77a3cae52959ea1f6df9c8c5cf20e157c8d2e9ba70af10
-
SSDEEP
3072:tGOFLomQsQtM25LSF12LT8nsQqIbSC3IzSNGOsDGLCpIfMhlGV6T3A/tROoHniXb:jXxQtJ2FSBYr3gOrEhdT3A/tROoHLQ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
18cb83aae77f7ec169671a8034968dd9d496b94f1ccd94b60092ddfbd299df00.exe windows x86
6ddcb287ba714291286e6072be43ad97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
ExpandEnvironmentStringsW
LoadLibraryA
GetSystemDirectoryW
GetWindowsDirectoryW
GetFileAttributesW
GetModuleFileNameW
lstrcatW
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentThreadId
GetVersionExA
TlsAlloc
GetModuleHandleA
MultiByteToWideChar
ExitProcess
HeapCreate
SetUnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentStringsW
GetCPInfo
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetSystemInfo
InitializeCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsBadCodePtr
GetLocalTime
GetProcAddress
advapi32
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegEnumValueW
mssip32
CryptSIPVerifyIndirectData
CryptSIPGetRegWorkingFlags
inseng
PurgeDownloadDirectory
Sections
.text Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 101KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 115KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ