Behavioral task
behavioral1
Sample
fb8ca7eb1e1b54e0dc00410c511e68f5f7234e1bbf83e7fa054dc7fdbc888661.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb8ca7eb1e1b54e0dc00410c511e68f5f7234e1bbf83e7fa054dc7fdbc888661.exe
Resource
win10v2004-20220812-en
General
-
Target
fb8ca7eb1e1b54e0dc00410c511e68f5f7234e1bbf83e7fa054dc7fdbc888661
-
Size
348KB
-
MD5
591dbb6a34166f3e9602058c31a6d6cc
-
SHA1
728d05e467448bba05523e0601124b68462d4bd8
-
SHA256
fb8ca7eb1e1b54e0dc00410c511e68f5f7234e1bbf83e7fa054dc7fdbc888661
-
SHA512
dbad8eca6636a571fcd5ef978f1a2176a9156b3ad5dded74a6a1c925f3b2dc7c6b64480dbdc815d24f096646c31cb726a37ab08c092642f1b597ebd2b8958459
-
SSDEEP
6144:sBoQP/6jTWJ8nreuAkp05C/STOg2vGW8faNMXKQZwBaNXryJaV:sBoQMpnrB/SEitwBGaaV
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
fb8ca7eb1e1b54e0dc00410c511e68f5f7234e1bbf83e7fa054dc7fdbc888661.exe windows x86
9e8a9bb517a490b41418031b78cb65ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
RpcMgmtStopServerListening
RpcServerUseProtseqEpA
RpcServerRegisterIf
RpcServerListen
NdrServerCall2
RpcImpersonateClient
RpcRevertToSelf
RpcRaiseException
RpcMgmtWaitServerListen
kernel32
ResetEvent
WaitForMultipleObjects
SetEvent
FindClose
FindFirstFileA
MultiByteToWideChar
lstrlenA
InterlockedDecrement
FreeLibrary
lstrcmpiA
VirtualFree
VirtualAlloc
GetSystemInfo
CreateFileA
GetFileSize
ReadFile
SetFilePointer
WriteFile
GetModuleHandleA
SetLastError
Sleep
CreateEventA
GetVersionExA
GetCurrentProcess
HeapAlloc
GetProcessHeap
HeapFree
WideCharToMultiByte
CreateThread
TerminateThread
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
Module32Next
Module32First
CreateToolhelp32Snapshot
OpenThread
GetProcAddress
LoadLibraryA
GetCurrentProcessId
ProcessIdToSessionId
GetTickCount
InterlockedIncrement
GetExitCodeProcess
GetCurrentThread
GetModuleFileNameA
WaitForSingleObject
GetLastError
FormatMessageA
LocalFree
CloseHandle
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapCreate
HeapDestroy
HeapReAlloc
GetOEMCP
GetCPInfo
HeapSize
GetStdHandle
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
VirtualQuery
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
ExitThread
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
user32
PostMessageA
PostThreadMessageA
advapi32
RegisterEventSourceA
RegCloseKey
SetServiceStatus
RegisterServiceCtrlHandlerExA
ReportEventA
DeregisterEventSource
StartServiceCtrlDispatcherA
CreateProcessAsUserA
DuplicateTokenEx
RevertToSelf
ImpersonateLoggedOnUser
GetTokenInformation
OpenThreadToken
ole32
CoInitializeEx
CoFreeUnusedLibraries
CoUninitialize
CoInitialize
oleaut32
SysAllocString
SafeArrayGetElement
SafeArrayDestroy
SafeArrayCopy
SafeArrayPutElement
VariantInit
SafeArrayCreate
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
VariantClear
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE