Behavioral task
behavioral1
Sample
549ce11808259307267e929e36896582041ca3be74b14044380b0022a7e15427.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
549ce11808259307267e929e36896582041ca3be74b14044380b0022a7e15427.exe
Resource
win10v2004-20220901-en
General
-
Target
549ce11808259307267e929e36896582041ca3be74b14044380b0022a7e15427
-
Size
240KB
-
MD5
3209e623bf6edbb43ed368059db3c755
-
SHA1
493660f4a404241b7ba2e6d421d6a07ccff437e2
-
SHA256
549ce11808259307267e929e36896582041ca3be74b14044380b0022a7e15427
-
SHA512
36821c73f337671c328b30b29c964d8cd974cb7ae7345c4312fb34df725f042304bf9602e9e946566f1c0e436f0020e391d643286bea2f30b7d1b188b492575e
-
SSDEEP
3072:/5OUh3XNUNjzmtlI+3KcxaEh9HOHRjfQrlvCwnrOtO48JYlQQ+QiQVQGnbpX+lCT:/5O83XNUxrstxN9cYy8JGUM
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
549ce11808259307267e929e36896582041ca3be74b14044380b0022a7e15427.exe windows x86
56b532d990352eed2d2473aa1275604b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
QueryPerformanceCounter
SetConsoleCtrlHandler
FindClose
FindFirstFileA
FindNextFileA
OutputDebugStringA
OpenEventA
SetEvent
QueryPerformanceFrequency
CloseHandle
HeapFree
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
SetStdHandle
GetLastError
GetFileType
WriteFile
SetHandleCount
GetStdHandle
GetStartupInfoA
ReadFile
WideCharToMultiByte
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
FlushFileBuffers
CreateFileA
CompareStringA
MultiByteToWideChar
GetCPInfo
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetFileAttributesA
GetFullPathNameA
GetCurrentDirectoryA
SetEnvironmentVariableW
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cxlfqbr Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE