Behavioral task
behavioral1
Sample
e5d09ef867e7b0996a7457b3550bca1edb3e6b5eb444141eaf3f9f15626a01fd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5d09ef867e7b0996a7457b3550bca1edb3e6b5eb444141eaf3f9f15626a01fd.exe
Resource
win10v2004-20220901-en
General
-
Target
e5d09ef867e7b0996a7457b3550bca1edb3e6b5eb444141eaf3f9f15626a01fd
-
Size
176KB
-
MD5
0283f764c8eb48c151d7f1ceed9d92bb
-
SHA1
99a983eaa58c14878e36c48255eaa3ee2cb170fb
-
SHA256
e5d09ef867e7b0996a7457b3550bca1edb3e6b5eb444141eaf3f9f15626a01fd
-
SHA512
79676993140efde5c60fc06c747ccd73eaa375a428ad061ed257ee88375a323ad15edcaa3d81c33ad32b1e3497f698faa44540ba70dfffbb5cccb20ff4090618
-
SSDEEP
3072:NX/4eI9RNZiOKCQp5hhPo9F023Z1EdXlMkLfVyg9J2fWWSgG579:5/zFbhOZ1EdX6k5/9Jn9
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e5d09ef867e7b0996a7457b3550bca1edb3e6b5eb444141eaf3f9f15626a01fd.exe windows x86
1042f249352088f5c8d4f8a3b1728f12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerLanguageNameA
kernel32
WinExec
GetDriveTypeA
DeleteFileA
GetVersionExA
GetModuleHandleA
GetSystemInfo
FindFirstFileA
IsDBCSLeadByte
GlobalFree
lstrlenA
lstrcpyA
FlushFileBuffers
GetModuleFileNameA
GetWindowsDirectoryA
SetFilePointer
WriteFile
GetLastError
GetTickCount
MulDiv
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcatA
lstrcmpiA
GlobalHandle
GetUserDefaultLCID
FindResourceA
GetProfileStringA
SetErrorMode
LoadLibraryA
FreeLibrary
CreateFileA
GetFileSize
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
FindClose
GetDiskFreeSpaceA
WritePrivateProfileStringA
LCMapStringW
HeapReAlloc
GetProcAddress
HeapAlloc
SetEnvironmentVariableA
VirtualAlloc
GetACP
CompareStringW
GetOEMCP
GetCPInfo
GetStringTypeW
CompareStringA
LCMapStringA
GetStringTypeA
SetStdHandle
MultiByteToWideChar
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
WideCharToMultiByte
GetVersion
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
ExitProcess
CreateDirectoryA
user32
DestroyWindow
EndDialog
DrawIcon
DialogBoxParamA
GetWindowPlacement
LoadIconA
DestroyIcon
SetRectEmpty
FillRect
LoadStringA
wsprintfA
PostQuitMessage
SetWindowTextA
GetDlgItem
InflateRect
SendMessageA
SetWindowLongA
InvalidateRect
BeginPaint
EndPaint
DefWindowProcA
GetWindowLongA
GetDC
ReleaseDC
LoadCursorA
GetClassInfoA
RegisterClassA
MoveWindow
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
CharUpperA
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
PeekMessageA
MessageBoxA
PostMessageA
FindWindowA
SubtractRect
SetWindowPos
GetClassNameA
IntersectRect
EqualRect
GetWindow
ScreenToClient
GetClientRect
UpdateWindow
SetTimer
ShowWindow
IsWindow
RegisterWindowMessageA
CreateDialogParamA
GetParent
SendDlgItemMessageA
CharNextA
SetRect
GetSystemMetrics
GetSysColor
CreateWindowExA
DrawTextA
gdi32
RestoreDC
DeleteObject
CreateFontIndirectA
GetObjectA
SaveDC
LineTo
MoveToEx
CreatePen
ExtTextOutA
SetBkColor
SetTextColor
GetTextMetricsA
CreateSolidBrush
CreateDIBitmap
RealizePalette
SelectPalette
GetDeviceCaps
CreatePalette
GetSystemPaletteEntries
UnrealizeObject
DeleteDC
BitBlt
CreateCompatibleDC
SelectClipRgn
CreateRectRgn
GetStockObject
GetTextExtentPointA
SelectObject
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE