Behavioral task
behavioral1
Sample
a5dc625889a26ad8e37ce4fecda881a7bb0ef88a4a972d5f0b6494a8204fd752.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5dc625889a26ad8e37ce4fecda881a7bb0ef88a4a972d5f0b6494a8204fd752.exe
Resource
win10v2004-20220812-en
General
-
Target
a5dc625889a26ad8e37ce4fecda881a7bb0ef88a4a972d5f0b6494a8204fd752
-
Size
360KB
-
MD5
68028568ad2bb7577d68579aa3b5728f
-
SHA1
1ddb82169f97ba101cc0f1d8220a3c738fd180ae
-
SHA256
a5dc625889a26ad8e37ce4fecda881a7bb0ef88a4a972d5f0b6494a8204fd752
-
SHA512
c9e392e030f37c867b45cf4ea2d8084458dd3453c61ec761dda28f520e315ccba440b85ac53344c0c07313297a5979eb562af77e708b84b8ec8eeb42a11c63a9
-
SSDEEP
6144:0dnBfFu2limytvaMnsZ+lWUa5JkYM+7Y3iMi:0dBtu2IJo+y7ci
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a5dc625889a26ad8e37ce4fecda881a7bb0ef88a4a972d5f0b6494a8204fd752.exe windows x86
425d9594f02e0203cef56cd55b796968
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetFileType
GetVersionExA
GetVolumeInformationA
Sleep
CreatePipe
CloseHandle
GetStartupInfoA
CreateProcessA
GetExitCodeProcess
PeekNamedPipe
ReadFile
WinExec
CreateThread
GetExitCodeThread
TerminateThread
ExitThread
GetLocalTime
GetModuleFileNameA
GetTickCount
GetWindowsDirectoryA
SetHandleCount
GetEnvironmentStringsW
GetCurrentProcessId
HeapCreate
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCommandLineA
HeapAlloc
RaiseException
RtlUnwind
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
HeapSize
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
user32
MessageBoxA
wininet
FtpGetFileA
HttpQueryInfoA
InternetOpenUrlA
HttpSendRequestA
HttpOpenRequestA
InternetWriteFile
FtpDeleteFileA
InternetReadFile
FtpOpenFileA
InternetFindNextFileA
FtpFindFirstFileA
InternetCloseHandle
InternetConnectA
InternetOpenA
ws2_32
WSASocketA
Sections
UPX0 Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE