Behavioral task
behavioral1
Sample
fa0191d30ac36e8e359bdfed13b5bdee0ce28a010cfcc7d7cc88ca5efebb5379.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa0191d30ac36e8e359bdfed13b5bdee0ce28a010cfcc7d7cc88ca5efebb5379.exe
Resource
win10v2004-20220901-en
General
-
Target
fa0191d30ac36e8e359bdfed13b5bdee0ce28a010cfcc7d7cc88ca5efebb5379
-
Size
259KB
-
MD5
6b42dc8673f220ea203d1192f44567af
-
SHA1
bcd8e30b9cdba6950733fe713651b8b59ca0c74f
-
SHA256
fa0191d30ac36e8e359bdfed13b5bdee0ce28a010cfcc7d7cc88ca5efebb5379
-
SHA512
3925586985298480c86dad32b4dd5dff786e6b14312c9c6b1869f0ddbfd2cfc9d76ebfc95475122977083cc5530e5d87346c780b0c7ae0c6917089de2166c732
-
SSDEEP
6144:vDiE2YtrXzDLMs+n51KD8TQuZVo9UhfrFkEJ3d4dmN0Fa:f2WLLs51T8ZUMUd4KH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fa0191d30ac36e8e359bdfed13b5bdee0ce28a010cfcc7d7cc88ca5efebb5379.exe windows x86
08300f7b205cb3035a9713557135d202
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
GetLocalTime
GetProcAddress
user32
GetSystemMetrics
GetMenuState
GetForegroundWindow
IsIconic
GetDesktopWindow
CreateDialogParamW
GetMenuItemID
GetActiveWindow
CharLowerA
LoadBitmapA
SetWindowRgn
DialogBoxIndirectParamW
ShowWindow
keybd_event
GetClassInfoExA
MoveWindow
GetCapture
UnregisterClassA
RegisterClassExA
GetTopWindow
MonitorFromRect
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
usp10
ScriptGetGlyphABCWidth
UspFreeMem
ScriptXtoCP
ScriptStringXtoCP
ScriptCPtoX
ScriptStringAnalyse
ScriptJustify
ScriptLayout
ScriptGetCMap
gdi32
SetWinMetaFileBits
SetEnhMetaFileBits
CreateBitmap
CreateICW
RemoveFontResourceA
GetMetaFileW
RemoveFontResourceExA
UpdateICMRegKeyA
StretchDIBits
tapisrv
ServiceMain
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 5KB - Virtual size: 303KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 77KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 1KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 141KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ