Behavioral task
behavioral1
Sample
3298b23ac487cb177d8f26eb5e5aa1dcaa26c6d1bcdd93ad7569eb8810b9b7b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3298b23ac487cb177d8f26eb5e5aa1dcaa26c6d1bcdd93ad7569eb8810b9b7b6.exe
Resource
win10v2004-20220812-en
General
-
Target
3298b23ac487cb177d8f26eb5e5aa1dcaa26c6d1bcdd93ad7569eb8810b9b7b6
-
Size
428KB
-
MD5
5157ccea86bf7107ad282cb06babc5a0
-
SHA1
31a9fdfd8d4318be71ce7cf649c66e715fae1056
-
SHA256
3298b23ac487cb177d8f26eb5e5aa1dcaa26c6d1bcdd93ad7569eb8810b9b7b6
-
SHA512
4831a4e722b1eee09a2b09a32e485961a1fbc6ee9d8b9c2102efba5044f0e4db6122ca1e8e9604665ab0beb1437d46a0066403bde2969e7b94261c6119213fe3
-
SSDEEP
6144:8zaClnwpb0FuV9kQLri6jl4bu30Zjpr44qa1PPzpeN0s7glCgz3WQPBhDB1J:b0q9kQ7jl4a30Zjpvqa1DWslCVyRnJ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3298b23ac487cb177d8f26eb5e5aa1dcaa26c6d1bcdd93ad7569eb8810b9b7b6.exe windows x86
7085187aa5dbf5dc31f5429034ea1178
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
Sleep
VirtualAlloc
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
ExitProcess
HeapReAlloc
RaiseException
GetSystemTimeAsFileTime
RtlUnwind
GetStartupInfoW
GetProcessHeap
HeapAlloc
HeapFree
SetErrorMode
LocalFileTimeToFileTime
FileTimeToLocalFileTime
WritePrivateProfileStringW
SystemTimeToFileTime
FileTimeToSystemTime
GetVersionExW
CreateFileW
GetShortPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcmpiW
GetThreadLocale
GetStringTypeExW
DeleteFileW
MoveFileW
lstrlenA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetDiskFreeSpaceW
GetFullPathNameW
GetTempFileNameW
GetFileTime
SetFileTime
GetFileAttributesW
CloseHandle
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetModuleHandleA
GlobalFree
GlobalAlloc
FormatMessageW
LocalFree
MulDiv
InterlockedDecrement
GetModuleFileNameW
FreeResource
GetCurrentThreadId
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
lstrcmpW
MultiByteToWideChar
GetVersionExA
GetVersion
lstrlenW
GlobalLock
GlobalUnlock
GetCurrentProcessId
GetProcAddress
GetModuleHandleW
LoadLibraryW
GlobalGetAtomNameW
GlobalAddAtomW
GetLastError
SetLastError
WideCharToMultiByte
FindResourceW
LoadResource
LockResource
SizeofResource
user32
CreateDialogIndirectParamW
CharUpperW
DestroyIcon
TranslateMessage
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ClientToScreen
SetWindowRgn
DrawIcon
FillRect
FindWindowW
SystemParametersInfoW
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageW
SendDlgItemMessageA
IsChild
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetWindowTextW
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetNextDlgTabItem
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
MessageBoxW
CreateWindowExW
GetClassInfoExW
RegisterClassW
AdjustWindowRectEx
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetClassNameW
GetSysColor
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
WinHelpW
SetWindowPos
SetFocus
GetWindowThreadProcessId
GetActiveWindow
IsWindowEnabled
GetFocus
EqualRect
GetDlgItem
SetWindowLongW
GetDlgCtrlID
PeekMessageW
LoadAcceleratorsW
GetParent
SetActiveWindow
IsWindowVisible
IsIconic
InsertMenuItemW
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
BringWindowToTop
PostMessageW
SetMenu
GetDesktopWindow
GetWindow
ShowWindow
GetWindowLongW
IsWindow
EndDialog
UnregisterClassW
GetSysColorBrush
GetMenuItemInfoW
GetMessageTime
ShowOwnedPopups
TranslateAcceleratorW
GetMessageW
DispatchMessageW
ReleaseDC
GetDC
InflateRect
PtInRect
GetSystemMetrics
DrawMenuBar
GetMenu
DeleteMenu
LoadBitmapW
GetKeyState
GetCapture
ReleaseCapture
GetCursorPos
SetCursor
LoadCursorW
EnableWindow
SetCapture
KillTimer
SetTimer
InvalidateRect
UpdateWindow
ScreenToClient
GetClientRect
RegisterWindowMessageW
GetClassInfoW
LoadIconW
SendMessageW
SetForegroundWindow
UnregisterClassA
gdi32
GetPixel
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreatePatternBrush
CreateFontIndirectW
GetTextExtentPoint32W
SetMapMode
DeleteObject
GetStockObject
GetObjectW
SetBkMode
RestoreDC
SaveDC
CreateDCW
DeleteDC
GetDeviceCaps
Ellipse
CreateEllipticRgn
SetBkColor
SetTextColor
GetClipBox
GetCurrentObject
Rectangle
DPtoLP
GetBitmapBits
CreateSolidBrush
CreatePen
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegSetValueExW
RegCreateKeyExW
GetFileSecurityW
SetFileSecurityW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyW
RegSetValueW
RegCloseKey
RegCreateKeyW
shell32
DragQueryFileW
SHGetFileInfoW
ExtractIconW
DragFinish
shlwapi
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE