Behavioral task
behavioral1
Sample
4ec20ff1f4df360c98ca3480861775e05417b9dc5486ea16228ad12e1279dd41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ec20ff1f4df360c98ca3480861775e05417b9dc5486ea16228ad12e1279dd41.exe
Resource
win10v2004-20220901-en
General
-
Target
4ec20ff1f4df360c98ca3480861775e05417b9dc5486ea16228ad12e1279dd41
-
Size
132KB
-
MD5
5f141867bdfc8feea74375d4b4c13838
-
SHA1
41273ba2cf975e46a40eae2aeca4fb58be61f24f
-
SHA256
4ec20ff1f4df360c98ca3480861775e05417b9dc5486ea16228ad12e1279dd41
-
SHA512
126e258b5d7da4de7ed77ce92500b295ee2981af2af7874239f44b6210691674420ce568a8300f2dcf69c35e31a499a098bd0e1a766dcf511fac1b7b0816fc01
-
SSDEEP
3072:HNu9ZDtB0giLi+CDP0fOJmxMVV7DkpMF1V/6Sf:HkZJ1iGRDMf34fkp6f
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4ec20ff1f4df360c98ca3480861775e05417b9dc5486ea16228ad12e1279dd41.exe windows x86
00e24b270f04dc51172be33fdeca02d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
RegSetValueExW
kernel32
ExitProcess
GetLastError
FreeLibrary
GetCommandLineW
GetProcAddress
LoadLibraryW
WritePrivateProfileStringW
ExpandEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
wsprintfW
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE