Behavioral task
behavioral1
Sample
8b140cb1c7311c625cde89a02fc34f51bf40a50347f59c2aa1dd1b7bfacbae94.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b140cb1c7311c625cde89a02fc34f51bf40a50347f59c2aa1dd1b7bfacbae94.exe
Resource
win10v2004-20221111-en
General
-
Target
8b140cb1c7311c625cde89a02fc34f51bf40a50347f59c2aa1dd1b7bfacbae94
-
Size
264KB
-
MD5
2785f4d9bb2a90656815afd5fe8e72fe
-
SHA1
6484d7861d9399182fb9a083f1264285e374023e
-
SHA256
8b140cb1c7311c625cde89a02fc34f51bf40a50347f59c2aa1dd1b7bfacbae94
-
SHA512
19b8789c7cc98d35162a0b47db0d95f223d828ab7fc897a47d4053f0f422d64dd208fcde200ab13acec707a642dcfd7b034bae89097ea1559718ad053e6527df
-
SSDEEP
6144:X6nJICTNEn+CVtbnXTIYf3dxXsY41pDVfEM5I64ReGJf:Kn7Ta+CPXck3dpQDBfEII6Tif
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8b140cb1c7311c625cde89a02fc34f51bf40a50347f59c2aa1dd1b7bfacbae94.exe windows x86
fbfc0f902eea2f08afe28bbb244e9852
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
SetEndOfFile
SetConsoleCtrlHandler
GetStringTypeW
GetStringTypeA
CreateFileA
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
SetFilePointer
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
ReadFile
WriteFile
GetCurrentThread
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
LCMapStringA
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
CreateFileW
PulseEvent
lstrcmpiW
TerminateThread
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
GetSystemDirectoryW
GetCurrentThreadId
GetVersionExW
InitializeCriticalSection
CreateEventW
WaitForMultipleObjects
DeleteCriticalSection
GetCurrentProcess
GetUserDefaultLangID
GetThreadLocale
OpenEventW
SetEvent
GetSystemPowerStatus
LocalAlloc
LocalFree
FormatMessageW
GetTickCount
lstrlenW
SetLastError
FreeLibrary
CreateThread
lstrcpynW
LeaveCriticalSection
WaitForSingleObject
CloseHandle
lstrcatW
Sleep
GetModuleHandleW
lstrcpyW
GetLastError
LoadLibraryW
GetProcAddress
CreateProcessW
GetModuleFileNameA
FatalAppExitA
ExitProcess
GetVersion
GetCommandLineA
GetVersionExA
GetModuleHandleA
LoadLibraryA
MultiByteToWideChar
RtlUnwind
HeapFree
HeapAlloc
user32
GetDC
SetWindowPos
SendMessageW
SystemParametersInfoW
GetWindowRect
FindWindowW
IntersectRect
GetSystemMetrics
InvalidateRect
SubtractRect
UnregisterDeviceNotification
RegisterDeviceNotificationW
GetUserObjectInformationW
PostQuitMessage
DefWindowProcW
RegisterClassExW
CreateWindowExW
GetMessageW
DispatchMessageW
CloseWindow
PostThreadMessageW
GetWindowThreadProcessId
GetThreadDesktop
OpenDesktopW
OpenInputDesktop
SetThreadDesktop
CloseDesktop
OpenWindowStationW
SetProcessWindowStation
ExitWindowsEx
GetLastInputInfo
MonitorFromWindow
EqualRect
GetDesktopWindow
wsprintfW
ChangeDisplaySettingsExW
GetTopWindow
GetWindow
GetClassNameW
PostMessageW
EnumDisplaySettingsW
IsRectEmpty
FindWindowExW
GetCursorPos
GetForegroundWindow
SetCursorPos
ReleaseDC
gdi32
CreateDCA
CreateDCW
ExtEscape
DeleteDC
advapi32
CreateServiceW
RegEnumValueW
ConvertStringSidToSidW
FreeSid
RegisterServiceCtrlHandlerW
SetServiceStatus
AllocateAndInitializeSid
SetEntriesInAclW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
RegSetKeySecurity
RegQueryInfoKeyW
RegEnumKeyExW
IsValidSid
RegGetKeySecurity
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetAce
GetLengthSid
InitializeAcl
AddAccessAllowedAceEx
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
OpenServiceW
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerW
RegCloseKey
CloseServiceHandle
RegOverridePredefKey
GetTokenInformation
RegOpenKeyExW
RegQueryValueExW
CreateProcessAsUserW
userenv
LoadUserProfileW
UnloadUserProfile
powrprof
CallNtPowerInformation
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE