Behavioral task
behavioral1
Sample
472754079b5c16ea69741fc634ff0b5160d656485b7b02e2c129b47b22b669b3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
472754079b5c16ea69741fc634ff0b5160d656485b7b02e2c129b47b22b669b3.exe
Resource
win10v2004-20220812-en
General
-
Target
472754079b5c16ea69741fc634ff0b5160d656485b7b02e2c129b47b22b669b3
-
Size
292KB
-
MD5
09d5b4f3143428746ff29934713cffb0
-
SHA1
bf9c783d5013bc78fe97f21ed3fdc361c7fd2ab6
-
SHA256
472754079b5c16ea69741fc634ff0b5160d656485b7b02e2c129b47b22b669b3
-
SHA512
c3d946d850a400feb98b14ea73fb7340a5153f827502d5a0593c9ba9842cade49e2aaf220c5e08098cedfd862932b3a1fc847be8fa7c28b8ee2ecff75a323ef0
-
SSDEEP
6144:9jewXYHpdkrCIjv+f+BRUIGaIwbp9Rq2ms34YPGr97Uec/ezW6kr:VXYHpdkrCITRUIPIwt9Rp14YPGrmYW/
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
472754079b5c16ea69741fc634ff0b5160d656485b7b02e2c129b47b22b669b3.exe windows x86
a934e1593a648d4722e8c70cc3db93cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
CreateMutexA
GetCurrentThreadId
GetCommandLineA
InitializeCriticalSection
lstrcpyA
lstrcatA
DeleteCriticalSection
CopyFileA
GetCurrentProcess
FlushFileBuffers
ReadFile
SetStdHandle
GetShortPathNameA
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
ExitProcess
GetVersion
GetStartupInfoA
RaiseException
HeapReAlloc
HeapAlloc
HeapFree
lstrlenA
MultiByteToWideChar
lstrlenW
GetWindowsDirectoryA
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
GetSystemDefaultLCID
GetLocaleInfoA
InterlockedDecrement
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryA
WriteFile
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatA
RtlUnwind
LocalFree
CloseHandle
GetUserDefaultLangID
InterlockedIncrement
SetFilePointer
user32
SendMessageA
DefWindowProcA
CharNextA
PostThreadMessageA
DispatchMessageA
GetMessageA
PostMessageA
CreateWindowExA
RegisterClassA
LoadIconA
SetForegroundWindow
FindWindowA
PostQuitMessage
EnableWindow
GetDlgCtrlID
EndDialog
GetDlgItem
SetWindowTextA
WinHelpA
LoadStringA
GetWindowRect
EnableMenuItem
wsprintfA
EnumDisplaySettingsA
CallWindowProcA
SetWindowLongA
GetParent
DialogBoxParamA
EnumChildWindows
GetSystemMenu
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
ole32
CoCreateInstance
CLSIDFromProgID
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterClassObject
CoInitialize
CoUninitialize
CoSuspendClassObjects
CoTaskMemRealloc
oleaut32
VariantClear
RegisterTypeLi
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
VarUI4FromStr
LoadTypeLi
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
PropertySheetA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
hccutils
IsDisplayValid
EnumDeviceByClass
GetAttachedMonitorDevice
FindResources
LoadSTRING
GetDisplayDevice
FindDeviceByNameAndClass
ReleaseClassDevice
LoadDialogString
GetCUIDriverFromClassDevice
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE