Behavioral task
behavioral1
Sample
dc65b8684dc4a71f1b2e74d868c3fca3f50beda5dc850038aa65fc28fb934916.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc65b8684dc4a71f1b2e74d868c3fca3f50beda5dc850038aa65fc28fb934916.exe
Resource
win10v2004-20220812-en
General
-
Target
dc65b8684dc4a71f1b2e74d868c3fca3f50beda5dc850038aa65fc28fb934916
-
Size
264KB
-
MD5
f4fae572c04fffc2480d041f18153b2b
-
SHA1
f20bec35fd6de83debc54ffe34c416413fc3f613
-
SHA256
dc65b8684dc4a71f1b2e74d868c3fca3f50beda5dc850038aa65fc28fb934916
-
SHA512
04ae25ff50926416f23696e4e2b20e2f4bb466e9d64ed68edc13d081656c2278103449507ecc07cb56b83f975fe3e9c32310554405d6289755f86f8f57e3233f
-
SSDEEP
6144:fHhoUgiJ+RyILlXoXBeB7zFBRs7Yn1NL:fBEDRyIpoReZBJ1N
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dc65b8684dc4a71f1b2e74d868c3fca3f50beda5dc850038aa65fc28fb934916.exe windows x86
b04249d57a085c3479436c99b059cc79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
ReleaseSemaphore
CreateSemaphoreA
DeviceIoControl
FindClose
CopyFileA
GetSystemDirectoryA
GetVersionExA
GetLastError
GetSystemTime
OutputDebugStringA
DeleteFileA
GetCurrentThreadId
MoveFileA
CreateThread
WaitForSingleObject
GetModuleFileNameA
GetTickCount
Sleep
lstrcpyA
GetModuleHandleA
CreateEventA
WaitForMultipleObjects
ResetEvent
GetSystemPowerStatus
CreateProcessA
GetPrivateProfileStringA
CreateFileA
SetFilePointer
WriteFile
CloseHandle
GetProcAddress
FreeLibrary
FindFirstFileA
SetEvent
CreateMutexA
ReleaseMutex
PulseEvent
FlushFileBuffers
LoadLibraryA
HeapFree
GetStartupInfoA
GetOEMCP
SetStdHandle
GetCPInfo
LCMapStringW
GetACP
GetStringTypeW
GetStringTypeA
LCMapStringA
IsBadCodePtr
IsBadReadPtr
MultiByteToWideChar
GetFileType
GetStdHandle
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
FreeEnvironmentStringsW
FreeEnvironmentStringsA
WideCharToMultiByte
IsBadWritePtr
VirtualAlloc
UnhandledExceptionFilter
HeapCreate
HeapDestroy
VirtualFree
HeapSize
GetCurrentProcess
GetEnvironmentVariableA
GetVersion
GetCommandLineA
RtlUnwind
HeapAlloc
HeapReAlloc
ExitProcess
user32
BroadcastSystemMessage
EnumDisplaySettingsA
KillTimer
ChangeDisplaySettingsA
SetTimer
GetWindowRect
RegisterWindowMessageA
GetSystemMetrics
MapWindowPoints
SystemParametersInfoA
IntersectRect
UnregisterHotKey
WindowFromDC
RegisterHotKey
GetCursor
SetCursor
LoadCursorA
DestroyWindow
SetWindowPos
DefWindowProcA
TranslateMessage
IsWindow
DispatchMessageA
CreateWindowExA
GetMessageA
ShowWindow
PostMessageA
RegisterClassA
FindWindowA
SetForegroundWindow
MessageBoxA
WaitForInputIdle
MsgWaitForMultipleObjects
GetDesktopWindow
GetCursorPos
gdi32
ExtEscape
GetClipBox
GetDeviceCaps
CreateDCA
DeleteDC
advapi32
CloseServiceHandle
FreeSid
RegCloseKey
RegSetValueExA
RegCreateKeyExA
AllocateAndInitializeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
DeregisterEventSource
OpenServiceA
OpenSCManagerA
RegCreateKeyA
CreateServiceA
DeleteService
ReportEventA
RegisterEventSourceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE