Behavioral task
behavioral1
Sample
792a13acda2c67335102eda66768484eeb3c2a21e5957521a9b940a828c21b1e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
792a13acda2c67335102eda66768484eeb3c2a21e5957521a9b940a828c21b1e.exe
Resource
win10v2004-20220812-en
General
-
Target
792a13acda2c67335102eda66768484eeb3c2a21e5957521a9b940a828c21b1e
-
Size
5KB
-
MD5
64507e643d190ac20613bcbac0348931
-
SHA1
b0445fc2581c38b16e9b1f7f4cd355bce1e7c195
-
SHA256
792a13acda2c67335102eda66768484eeb3c2a21e5957521a9b940a828c21b1e
-
SHA512
ede516bd7966cfcb5f1cbf0f899347a2f2bfcb873e524fb358bcfd89b9bc748b2a2f4d49075ac879fb2fa10f12edba54cbdede1345d6e7924955339499fdbbc2
-
SSDEEP
96:qCfQxVnYnMwAP72VyRb8swgPmQt7f7YINwFSps:QcM5/JTO4D7YINM
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
792a13acda2c67335102eda66768484eeb3c2a21e5957521a9b940a828c21b1e.exe windows x86
90ad4ea86bed0b180a3a74906e00fd48
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ReplaceTextA
shell32
StrStrIW
user32
DdeQueryConvInfo
kernel32
ExitProcess
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE