Behavioral task
behavioral1
Sample
cba0f03305cbb33b20a99d0ff01f8eaee8015dd083299d6f135fa5f01a6192a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cba0f03305cbb33b20a99d0ff01f8eaee8015dd083299d6f135fa5f01a6192a9.exe
Resource
win10v2004-20221111-en
General
-
Target
cba0f03305cbb33b20a99d0ff01f8eaee8015dd083299d6f135fa5f01a6192a9
-
Size
222KB
-
MD5
f0d4c695cfc2c48095e73d0a6ae2875b
-
SHA1
9900ef6925513ce565378c731c21dd83e18260b9
-
SHA256
cba0f03305cbb33b20a99d0ff01f8eaee8015dd083299d6f135fa5f01a6192a9
-
SHA512
c6ec89883c847d2dcf862e109000d89c140f45e3770dd631c8ce564c20ef5656b46dab7eb1a4025ea520ddf5d5d334936ac4427496312161edfc192db53aa4b7
-
SSDEEP
3072:04eK8X2CIJ23P51llkNdgGPCK0LWahmXP5apiWsgB9PLB0LWuhmNx0FzXxiMbPAm:je3X2CCUPTlloqiPR+dK/a
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cba0f03305cbb33b20a99d0ff01f8eaee8015dd083299d6f135fa5f01a6192a9.exe windows x86
9c8decf3582072f6edfc385a689f44f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
DeleteFileA
ExitProcess
FreeLibrary
GetCommandLineA
GetFileTime
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcatA
lstrcmpiA
RemoveDirectoryA
SetFileTime
VirtualAlloc
VirtualFree
WriteFile
Sections
UPX0 Size: - Virtual size: 272KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 181KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE