Behavioral task
behavioral1
Sample
78496b71232ca299c4dd19a8bd6d2f697183de92426f645db0fde6a6ceb5ed68.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78496b71232ca299c4dd19a8bd6d2f697183de92426f645db0fde6a6ceb5ed68.exe
Resource
win10v2004-20221111-en
General
-
Target
78496b71232ca299c4dd19a8bd6d2f697183de92426f645db0fde6a6ceb5ed68
-
Size
5KB
-
MD5
05707c96c63da385eaab2127f715fd30
-
SHA1
7b90b97591ce325942f749cf86b9425505d2db56
-
SHA256
78496b71232ca299c4dd19a8bd6d2f697183de92426f645db0fde6a6ceb5ed68
-
SHA512
7928061ae724ce49465ea17a02c07b04fb6b45d8d7f242ea440280ee6180891d98a7516a1970bcb3dc9e431797cf481ed4ffd5aff70f7f94a9d189c079d486c8
-
SSDEEP
96:33NIbi2x1vjLLKfKMM5tg3mYgYpmDKB44A5+oMxlQiJOsQemzf7YINgDciC:tGi2DveCIAPORA5+owQRsQZ77YINl
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
78496b71232ca299c4dd19a8bd6d2f697183de92426f645db0fde6a6ceb5ed68.exe windows x86
90ad4ea86bed0b180a3a74906e00fd48
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ReplaceTextA
shell32
StrStrIW
user32
DdeQueryConvInfo
kernel32
ExitProcess
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE