Behavioral task
behavioral1
Sample
16791278ce28e6028beb9229e192590e46ba741571e25469e883a8d730f8c687.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
16791278ce28e6028beb9229e192590e46ba741571e25469e883a8d730f8c687.exe
Resource
win10v2004-20220812-en
General
-
Target
16791278ce28e6028beb9229e192590e46ba741571e25469e883a8d730f8c687
-
Size
148KB
-
MD5
4d67c57f229503c9310d42000e9e4d52
-
SHA1
d50b580e5ebd378a878e87b4e70950eee4dbf165
-
SHA256
16791278ce28e6028beb9229e192590e46ba741571e25469e883a8d730f8c687
-
SHA512
3d77be9e121dcc2fe947fee0b6a3338852e419c02227e87d1e8ce7fa83d8aa5da326f5a51b6000f68e1554e88b5f5708740d66f1089d1e69775b574aff50b9a3
-
SSDEEP
3072:gwGPbLtrAAXEp0wT2sHAyJ8dIxlpwtwWcUbQyRga4r7j4xMSXnhZe67Y3yE:gZDLtrapHB9ILQyRV4rOMS3hZef
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
16791278ce28e6028beb9229e192590e46ba741571e25469e883a8d730f8c687.exe windows x86
ce92033a96981e8e248a528226d534f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_XcptFilter
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
__p__commode
_c_exit
kernel32
GetModuleHandleA
GetStartupInfoA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE