Behavioral task
behavioral1
Sample
e17b7f9a5b0d65aa95d937e12c7f6079c0d8ca6a3b5b759edabd8be0e4ad675d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e17b7f9a5b0d65aa95d937e12c7f6079c0d8ca6a3b5b759edabd8be0e4ad675d.exe
Resource
win10v2004-20220812-en
General
-
Target
e17b7f9a5b0d65aa95d937e12c7f6079c0d8ca6a3b5b759edabd8be0e4ad675d
-
Size
266KB
-
MD5
76ab9d234a5ffec750fe8b8b87700e3f
-
SHA1
b5bb9c4152a0193e62c75fe957e1d8047442fc94
-
SHA256
e17b7f9a5b0d65aa95d937e12c7f6079c0d8ca6a3b5b759edabd8be0e4ad675d
-
SHA512
3f40db80af72ba3a0d0295f6329eb4fb34a7e91c7755dbfefff901566ccc29c6950a276fb265b76b62a4976ce02248233f83e7164f400a8bb1e1bfc9cf698caa
-
SSDEEP
3072:AW/1lqNqAoPJl+Q7fFOPLfie9rHbK5pWsl8bnDZNnZRfs6pCWtKU7xTVKpfo5Utn:frDPSgFCqiXIQ28bDr5trKpfo5aoo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e17b7f9a5b0d65aa95d937e12c7f6079c0d8ca6a3b5b759edabd8be0e4ad675d.exe windows x86
54e009db0d04ac6413ca63a9073a239c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
BeginUpdateResourceW
GetProcAddress
user32
GetSystemMetrics
EnableMenuItem
mouse_event
PostMessageW
LoadMenuIndirectA
IsMenu
SetCursor
DestroyCursor
GetMenuItemID
wvsprintfA
GetMenuInfo
UnregisterClassA
GetScrollPos
FindWindowW
EnableWindow
GetClassInfoExA
CreateAcceleratorTableW
GetIconInfo
keybd_event
SetWindowPos
CreatePopupMenu
CreateMenu
GetCapture
SetDlgItemTextA
GetDlgItemTextW
EnumClipboardFormats
CharLowerA
GetSysColorBrush
CreateDialogParamW
PeekMessageA
AppendMenuA
MonitorFromWindow
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
resutils
ResUtilGetProperty
ResUtilVerifyPropertyTable
ResUtilVerifyResourceService
ResUtilGetBinaryValue
ResUtilSetPropertyParameterBlock
ResUtilFindDependentDiskResourceDriveLetter
ResUtilGetProperties
ResUtilSetPropertyParameterBlockEx
ResUtilGetPropertySize
ResUtilGetAllProperties
ResUtilIsResourceClassEqual
ResUtilVerifyService
ResUtilFindDwordProperty
ResUtilGetResourceDependency
ResUtilSetResourceServiceStartParameters
gdi32
CreateDIBSection
GetMetaFileA
CreateBrushIndirect
GetRasterizerCaps
AddFontResourceA
UpdateICMRegKeyA
GetStockObject
d3d8thk
OsThunkDdGetBltStatus
OsThunkDdDestroyMoComp
OsThunkDdCreateMoComp
OsThunkDdGetDriverInfo
OsThunkDdUnlockD3D
OsThunkDdGetDxHandle
OsThunkDdGetDC
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 3KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 5KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 91KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 130KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 2KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ