Behavioral task
behavioral1
Sample
8b4041e9b6267ed5da67c0d43c893b4cce691d0325e5bf0cd10b6af2e595945b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b4041e9b6267ed5da67c0d43c893b4cce691d0325e5bf0cd10b6af2e595945b.exe
Resource
win10v2004-20220901-en
General
-
Target
8b4041e9b6267ed5da67c0d43c893b4cce691d0325e5bf0cd10b6af2e595945b
-
Size
164KB
-
MD5
14111e1d0285698ba0fa098e382a3c41
-
SHA1
49e27db73c9736f1422f08feebee9ec1674bc076
-
SHA256
8b4041e9b6267ed5da67c0d43c893b4cce691d0325e5bf0cd10b6af2e595945b
-
SHA512
7b16845569a3ec2da471d8b00c1071f2e65f75ff3582f5f8bebb581fbe93bba30cd8b9639cb875d5dbde71f58a75d05aa1b7a5ad99820c2eddc0ba1645a6e77c
-
SSDEEP
3072:ZL3gPqoet6qKDkmqRtyjA3iphw7GJS9w/:ZLwmODkmqCk3iQ7ch/
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8b4041e9b6267ed5da67c0d43c893b4cce691d0325e5bf0cd10b6af2e595945b.exe windows x86
448f51eae75a63a63ed7ce69360b3f66
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
SetLastError
FormatMessageA
CloseHandle
GetLastError
HeapAlloc
GetProcessHeap
GetProcAddress
LoadLibraryA
HeapFree
TerminateProcess
DeleteFileA
SetFileAttributesA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
RemoveDirectoryA
lstrlenA
FreeLibrary
LocalAlloc
GetWindowsDirectoryA
GetVersionExA
MoveFileExA
GetSystemDirectoryA
ReadFile
SetEndOfFile
SetFilePointer
CreateFileA
GetStringTypeW
FlushFileBuffers
SetStdHandle
LocalFree
GetEnvironmentStringsW
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
advapi32
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiCallClassInstaller
SetupDiDestroyDeviceInfoList
rpcrt4
UuidToStringA
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE