Behavioral task
behavioral1
Sample
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe
Resource
win10v2004-20221111-en
General
-
Target
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81
-
Size
324KB
-
MD5
4f70734b087b989d43f00b4b898fa0b4
-
SHA1
85a7f29d933df315834adf9c1ed97a9e834c34c6
-
SHA256
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81
-
SHA512
133acebf6ec4e003655bf2115a553824fdc5b4ab4acc35d1fb8f200d02dc0f7840c9b47eaaab8bc56308d5408fc3659de4726ec855e8b4e9527f67001fa1c3ef
-
SSDEEP
6144:d/j5C+E13/4YIJ8m1MxUyRzoVOBlYQflIGE:d/s+mP4BJTM6++OBlYERE
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
0a14aecf5f56d8ba33450b26a1926374a7cbb856130c6983d5b5c3e4fdc55f81.exe windows x86
374ff5ae97cc8792c9239df11878bbfb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
CreateFileA
_lwrite
_lclose
_llseek
_lopen
_lread
_lcreat
SetErrorMode
GlobalUnlock
GlobalLock
FindNextFileA
FindFirstFileA
RemoveDirectoryA
FindClose
DeleteFileA
GetTempPathA
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
FlushFileBuffers
SetStdHandle
HeapReAlloc
CreateDirectoryA
GlobalFree
GetVersionExA
GetCurrentProcess
GetLastError
GetSystemDefaultLangID
WinExec
LoadLibraryA
GetCurrentDirectoryA
GetSystemDirectoryA
GetModuleHandleA
SetCurrentDirectoryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
CreateThread
CloseHandle
GetFileAttributesA
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapAlloc
VirtualAlloc
user32
ExitWindowsEx
LoadStringA
MessageBoxA
PostThreadMessageA
LoadImageA
AdjustWindowRectEx
GetDesktopWindow
GetWindowRect
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassA
GetMessageA
DestroyWindow
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
GetDC
InvalidateRect
ReleaseDC
DefWindowProcA
GetWindowLongA
SetWindowLongA
PostQuitMessage
gdi32
GetObjectA
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreatePalette
SelectPalette
UnrealizeObject
RealizePalette
DeleteObject
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueA
RegCloseKey
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE