Behavioral task
behavioral1
Sample
a550bfda168eee39bd3141b47482a868092566f1ee43774bd3c2c39a2a0f475e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a550bfda168eee39bd3141b47482a868092566f1ee43774bd3c2c39a2a0f475e.exe
Resource
win10v2004-20220812-en
General
-
Target
a550bfda168eee39bd3141b47482a868092566f1ee43774bd3c2c39a2a0f475e
-
Size
270KB
-
MD5
6524b85e15102026f336fe9ca4f1271a
-
SHA1
f03f2cfd2b983677fa76783fcf52e947ec1dfea4
-
SHA256
a550bfda168eee39bd3141b47482a868092566f1ee43774bd3c2c39a2a0f475e
-
SHA512
3c8d58c8420491a6a406462f4a35b9f1f2d6c2db5a0d28ea64c9e7669cec8056d76c57f9ecce76fdb24fc74a149494138ea852ed64f07269072fc71c9f8d4431
-
SSDEEP
6144:xo4NTTsuJ9fTl6gZS/Rf7pZjDdd0Uu6gwS7xBH28Bj:+4NfsuJSdhdd0Uu6gw2BH5Bj
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a550bfda168eee39bd3141b47482a868092566f1ee43774bd3c2c39a2a0f475e.exe windows x86
c6400dced7b74aaa9f5a124498168dd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
NdrServerCall2
RpcServerRegisterAuthInfoA
RpcServerUseProtseqEpA
RpcServerRegisterIf
RpcMgmtStopServerListening
RpcServerUnregisterIf
RpcServerInqBindings
RpcBindingVectorFree
RpcServerListen
kernel32
InitializeCriticalSection
GetSystemInfo
WaitForSingleObject
GetVersionExA
CreateEventA
SetEvent
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleHandleA
GetCurrentProcess
TlsAlloc
GetLastError
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentStringsW
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetProcessHeap
GetProcAddress
advapi32
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
scecli
SceStartTransaction
SceSetupUnwindSecurityFile
SceUpdateSecurityProfile
SceFreeProfileMemory
SceSetupUpdateSecurityKey
SceOpenPolicy
SceSvcSetInformationTemplate
ieaksie
DllRegisterServer
Sections
UPX1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kko Size: 3KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gFV Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ZVm Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jzyAY Size: 3KB - Virtual size: 487KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 101KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IEce Size: 5KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Ir Size: 3KB - Virtual size: 629KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 120KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ