Behavioral task
behavioral1
Sample
be5fd84acfcc4d7cae75ed95316798d81b9d45ef711f02c7871c004c211ca0a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be5fd84acfcc4d7cae75ed95316798d81b9d45ef711f02c7871c004c211ca0a0.exe
Resource
win10v2004-20220812-en
General
-
Target
be5fd84acfcc4d7cae75ed95316798d81b9d45ef711f02c7871c004c211ca0a0
-
Size
266KB
-
MD5
95d7b1f87d06fb33baf7a71402ed69af
-
SHA1
175e55b94d12f019d7744f500c6199b13d01fd02
-
SHA256
be5fd84acfcc4d7cae75ed95316798d81b9d45ef711f02c7871c004c211ca0a0
-
SHA512
acd881cc2aa165b4e9a0b2573d5f7ae218a6ec782bf37ab7bcc8f2f14477f204dc29b1710d3076c0941a7d516537adeb07bc0afa666dd9c1437a971cdfd5a6e4
-
SSDEEP
3072:QW/1lqNqAoPJl+Q7fFOPLfie9rHbK5pWsl8bnDZNnZRfs6pCWtKU7xTVKpfo5Utn:PrDPSgFCqiXIQ28bDr5trKpfo5aoo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
be5fd84acfcc4d7cae75ed95316798d81b9d45ef711f02c7871c004c211ca0a0.exe windows x86
54e009db0d04ac6413ca63a9073a239c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
BeginUpdateResourceW
GetProcAddress
user32
GetSystemMetrics
EnableMenuItem
mouse_event
PostMessageW
LoadMenuIndirectA
IsMenu
SetCursor
DestroyCursor
GetMenuItemID
wvsprintfA
GetMenuInfo
UnregisterClassA
GetScrollPos
FindWindowW
EnableWindow
GetClassInfoExA
CreateAcceleratorTableW
GetIconInfo
keybd_event
SetWindowPos
CreatePopupMenu
CreateMenu
GetCapture
SetDlgItemTextA
GetDlgItemTextW
EnumClipboardFormats
CharLowerA
GetSysColorBrush
CreateDialogParamW
PeekMessageA
AppendMenuA
MonitorFromWindow
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
resutils
ResUtilGetProperty
ResUtilVerifyPropertyTable
ResUtilVerifyResourceService
ResUtilGetBinaryValue
ResUtilSetPropertyParameterBlock
ResUtilFindDependentDiskResourceDriveLetter
ResUtilGetProperties
ResUtilSetPropertyParameterBlockEx
ResUtilGetPropertySize
ResUtilGetAllProperties
ResUtilIsResourceClassEqual
ResUtilVerifyService
ResUtilFindDwordProperty
ResUtilGetResourceDependency
ResUtilSetResourceServiceStartParameters
gdi32
CreateDIBSection
GetMetaFileA
CreateBrushIndirect
GetRasterizerCaps
AddFontResourceA
UpdateICMRegKeyA
GetStockObject
d3d8thk
OsThunkDdGetBltStatus
OsThunkDdDestroyMoComp
OsThunkDdCreateMoComp
OsThunkDdGetDriverInfo
OsThunkDdUnlockD3D
OsThunkDdGetDxHandle
OsThunkDdGetDC
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 3KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 5KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 91KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 130KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 2KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ