Behavioral task
behavioral1
Sample
7cbdf60e0e769f91ee7bd57128bca8522e93901f907c9cdd5433724ad2333552.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cbdf60e0e769f91ee7bd57128bca8522e93901f907c9cdd5433724ad2333552.exe
Resource
win10v2004-20220812-en
General
-
Target
7cbdf60e0e769f91ee7bd57128bca8522e93901f907c9cdd5433724ad2333552
-
Size
268KB
-
MD5
8829a8af4a9f1657fd6871e06a82866e
-
SHA1
8fe0e48d818c8ef2b8d1211eeb0145408aa257f7
-
SHA256
7cbdf60e0e769f91ee7bd57128bca8522e93901f907c9cdd5433724ad2333552
-
SHA512
08db0c712db092d718343bf9b668ed3b4481a8ae941f41229c5eecd81606287deb849951d79cb3997b1261a404f47f844f159aff86bb6723bb12c8bd08d49230
-
SSDEEP
3072:cMNsQNxJUJTp2E+qvFuIoF1PYUGQQEKGLY+q+XrNJd2/GP+ohCvirEqYVvoKznPe:yQOpkpNJS6j2oKznLL9baIodb/VRwa
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7cbdf60e0e769f91ee7bd57128bca8522e93901f907c9cdd5433724ad2333552.exe windows x86
b4e0151a222ad217806d8344bc933b60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerInstallFileA
kernel32
CloseHandle
Sleep
lstrlenW
DeleteFileA
GetAtomNameA
RemoveDirectoryA
SetEvent
OpenEventA
AddAtomA
HeapDestroy
GetModuleHandleA
GetStartupInfoA
HeapCreate
ExitProcess
GetCommandLineA
HeapAlloc
CompareStringA
HeapFree
LockResource
LoadResource
CompareStringW
GetVersionExA
SetErrorMode
LocalFree
FormatMessageA
InterlockedDecrement
CreateProcessA
CreateFileA
CopyFileA
GetTempFileNameA
GetTempPathA
WaitForSingleObject
SetFileAttributesA
ReadFile
GetShortPathNameA
GetPrivateProfileStringA
GetFileAttributesA
CreateDirectoryA
GlobalLock
GlobalAlloc
MultiByteToWideChar
GetModuleFileNameA
RtlUnwind
WideCharToMultiByte
lstrlenA
GlobalUnlock
GlobalFree
GetLastError
SetLastError
lstrcpyA
lstrcatA
GetUserDefaultLangID
GetPrivateProfileIntA
FindResourceA
FindResourceExA
GetWindowsDirectoryA
user32
TranslateMessage
PeekMessageA
GetWindowLongA
EndDialog
GetDlgItem
SendMessageA
SetWindowLongA
DispatchMessageA
IsDialogMessageA
CreateDialogIndirectParamA
SetDlgItemTextA
GetDesktopWindow
GetClientRect
GetWindowRect
MoveWindow
CharNextA
CharUpperA
CharLowerA
ReleaseDC
LoadImageA
GetDC
EndPaint
CreateDialogParamA
BeginPaint
DialogBoxIndirectParamA
MessageBoxA
DestroyWindow
wsprintfA
gdi32
DeleteDC
SelectObject
RealizePalette
SelectPalette
UnrealizeObject
CreateCompatibleDC
GetObjectA
GetDeviceCaps
CreateHalftonePalette
CreatePalette
GetSystemPaletteEntries
GetDIBColorTable
BitBlt
advapi32
RegCreateKeyA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
ole32
CoCreateInstance
CoFreeAllLibraries
CoInitialize
CoUninitialize
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
SafeArrayGetLBound
VariantClear
SafeArrayGetElement
SysAllocString
SafeArrayGetUBound
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE