Behavioral task
behavioral1
Sample
2d2b0e0901edde3f69992b095950219152495be784509c628c9c6130ea23da95.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2d2b0e0901edde3f69992b095950219152495be784509c628c9c6130ea23da95.exe
Resource
win10v2004-20221111-en
General
-
Target
2d2b0e0901edde3f69992b095950219152495be784509c628c9c6130ea23da95
-
Size
164KB
-
MD5
0132f19464b1977ca5b470309a5990c4
-
SHA1
50e00fb8c1a0d064a1e8d5845a09b5c9455c6269
-
SHA256
2d2b0e0901edde3f69992b095950219152495be784509c628c9c6130ea23da95
-
SHA512
f803bba6d14aed454aeba820c6c16df42c1fb838162eefe42b467b98f8138da7247ab706827f82affbbe87945adab415072b65bd6a7bb686541a3a431ec2a6ac
-
SSDEEP
3072:GT/pcNB7gqbLhPMy8nndQJcASPrV79AGK2QsdDoUs7MACRHBIvtqwhnHcW:gg7gqbVPbaUT977m1OlqwhnHcW
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
2d2b0e0901edde3f69992b095950219152495be784509c628c9c6130ea23da95.exe windows x86
91cc78c0a4abcac76b0ad7bee6da36e8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessA
GetCommandLineA
CloseHandle
GetLastError
CreateEventA
GetTickCount
GetProcAddress
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
HeapAlloc
GetStringTypeA
GetStringTypeW
VirtualAlloc
LoadLibraryA
user32
MessageBoxA
LoadStringA
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE