Behavioral task
behavioral1
Sample
691f5cfc851013c52ced1ae50f7ab9bd51866a1f44efa2ae9537be57d55442c7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
691f5cfc851013c52ced1ae50f7ab9bd51866a1f44efa2ae9537be57d55442c7.exe
Resource
win10v2004-20221111-en
General
-
Target
691f5cfc851013c52ced1ae50f7ab9bd51866a1f44efa2ae9537be57d55442c7
-
Size
160KB
-
MD5
15cf018410f1aaa6297e5a13f0225c03
-
SHA1
2e200bf8a11f4c30182cd2ceb9289ce4a5f0322a
-
SHA256
691f5cfc851013c52ced1ae50f7ab9bd51866a1f44efa2ae9537be57d55442c7
-
SHA512
5cf8b3303ff52932b862c1733d94c8d10c220bfc963eab1dc610bdef7caa25caf4a57af09a87aa6c00e5a8a5aaaacbbe6625b7abe84990065217cf7fa4731c83
-
SSDEEP
3072:7v8QitRv0cKFYcu/vdXKEsZrzlLhUQ3wLdnL:7v8hvmFlu3dXKNZrzlLWQAxL
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
691f5cfc851013c52ced1ae50f7ab9bd51866a1f44efa2ae9537be57d55442c7.exe windows x86
e1367f3ec10cc4c6d40956da300cb144
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetSystemInfo
CreateEventA
WaitForSingleObject
SetEvent
ExitProcess
GetVersionExA
CreateFileA
CloseHandle
GlobalAlloc
GlobalFree
GetLastError
GetModuleHandleA
GetCommandLineA
RtlUnwind
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
WriteFile
ReadFile
GetProcAddress
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FlushFileBuffers
HeapAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualQuery
user32
GetUserObjectSecurity
advapi32
IsValidSecurityDescriptor
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
GetKernelObjectSecurity
SetKernelObjectSecurity
GetSecurityDescriptorOwner
LookupAccountSidA
GetSecurityDescriptorGroup
LookupAccountNameA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
StartServiceA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
SetSecurityDescriptorDacl
AddAccessAllowedAce
GetAce
AddAce
InitializeAcl
GetAclInformation
GetLengthSid
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE