Behavioral task
behavioral1
Sample
11d580c3e376ad6bda665d26bd8ec228fa79c66505fd520e7bb036634cf6d9db.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
11d580c3e376ad6bda665d26bd8ec228fa79c66505fd520e7bb036634cf6d9db.exe
Resource
win10v2004-20220812-en
General
-
Target
11d580c3e376ad6bda665d26bd8ec228fa79c66505fd520e7bb036634cf6d9db
-
Size
264KB
-
MD5
48573b940da9b1f0a361001131c8f40e
-
SHA1
1bdd59698142bb26d772bdad14a6d12bd65b3bfd
-
SHA256
11d580c3e376ad6bda665d26bd8ec228fa79c66505fd520e7bb036634cf6d9db
-
SHA512
aaf283857cb84b20ab7725943b3afea48ba0573b4f94e049402def71a34611d3ee8230a28e89698a8b96da2945e427ab7b56778932cfeeb0aadbf8b913ac655b
-
SSDEEP
3072:9lhv4Os1JtvkPAbl9D8lYw1IvOlqEGwnnnBH1hgimtVDeRufcJO0b0bFHrhIYa:FK1JdDg6wEOlqjeHX4DeRufqj0UYa
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
11d580c3e376ad6bda665d26bd8ec228fa79c66505fd520e7bb036634cf6d9db.exe windows x86
30b729aff37b70c8c423ffcee829ba6e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
mfc80u
ord2531
ord5209
ord5226
ord4562
ord3942
ord5222
ord5220
ord2925
ord1911
ord3826
ord5378
ord6215
ord5096
ord1007
ord3800
ord5579
ord2009
ord2054
ord4320
ord6274
ord3795
ord6272
ord4008
ord2725
ord2239
ord266
ord265
ord5113
ord1049
ord776
ord2121
ord1189
ord6165
ord6171
ord6161
ord555
ord313
ord6173
ord778
ord6111
ord1079
ord4100
ord2444
ord5524
ord3383
ord6167
ord4027
ord5485
ord1198
ord2829
ord4301
ord2708
ord2832
ord2534
ord2640
ord2527
ord3712
ord3713
ord3703
ord2638
ord3943
ord4475
ord4255
ord3327
ord566
ord757
ord3677
ord4101
ord5558
ord287
ord2260
ord3990
ord860
ord2311
ord3927
ord777
ord290
ord762
ord1472
ord6700
ord282
ord2895
ord870
ord1479
ord900
ord283
ord896
ord774
ord1178
ord1182
ord593
ord5119
ord3249
ord334
ord293
ord280
ord4078
ord2261
ord577
ord1476
ord764
ord4032
msvcr80
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_controlfp_s
__wgetmainargs
_amsg_exit
mbstowcs_s
sprintf_s
wcstombs_s
_vswprintf_c_l
wcscat_s
wcscpy_s
_wtoi
_wstat64i32
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
memcpy
_wsplitpath_s
__argc
__wargv
_crt_debugger_hook
_cexit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
free
__CxxFrameHandler3
kernel32
GetCurrentDirectoryW
CreateDirectoryW
GetTempPathW
WinExec
MapViewOfFile
OpenFileMappingW
GetTickCount
GetLastError
CreateFileMappingW
UnmapViewOfFile
RaiseException
DeleteCriticalSection
LoadLibraryW
FreeLibrary
SetCurrentDirectoryW
Sleep
InterlockedCompareExchange
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetFileAttributesW
WideCharToMultiByte
FindFirstFileW
CreateMutexW
WaitForSingleObject
MultiByteToWideChar
GetDriveTypeW
GetModuleFileNameW
CloseHandle
GetLocaleInfoA
GetThreadLocale
GetVersionExA
InterlockedExchange
ReleaseMutex
user32
UnregisterClassW
advapi32
RegCreateKeyExW
RegOpenKeyExA
RegQueryValueExA
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
shell32
ShellExecuteW
ole32
CoInitialize
CoCreateInstance
CLSIDFromProgID
CoUninitialize
oleaut32
SysAllocString
SysFreeString
SysAllocStringLen
atl80
ord30
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE