Behavioral task
behavioral1
Sample
b5b2729ad7ca82b73fc13fc5bc6286375d4c9e0488b63952e209eb28eeba447a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5b2729ad7ca82b73fc13fc5bc6286375d4c9e0488b63952e209eb28eeba447a.exe
Resource
win10v2004-20220812-en
General
-
Target
b5b2729ad7ca82b73fc13fc5bc6286375d4c9e0488b63952e209eb28eeba447a
-
Size
276KB
-
MD5
10aa353869044bac0c6aa1beb242d1f0
-
SHA1
1a274574fc72cf56a27a014620d25a79498e23b5
-
SHA256
b5b2729ad7ca82b73fc13fc5bc6286375d4c9e0488b63952e209eb28eeba447a
-
SHA512
e86bc63dc659808c40c5090c0abce1ae2d5762b80eac93cd6ddf5b66135557aba587ca7019221aed01f00ec8c576b87bb7dff0de0c408068f2c3a1288040ec6d
-
SSDEEP
6144:F4P885qxrnbQR8vhTcqHR18lGk9mi+BAENW958AwV:Fa8VxDbbvhpHuGfZBAR51wV
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b5b2729ad7ca82b73fc13fc5bc6286375d4c9e0488b63952e209eb28eeba447a.exe windows x86
3ff5a8be29653527e738cd256f4d599f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
CreateMutexA
GetProcAddress
user32
GetSystemMetrics
GetMenuItemCount
AppendMenuW
InvalidateRgn
SetForegroundWindow
SetDlgItemTextW
SetActiveWindow
SetMenu
CreateAcceleratorTableA
DefWindowProcA
OffsetRect
RegisterClassW
GetCapture
RegisterClassExW
SetFocus
IsMenu
DialogBoxIndirectParamA
IsIconic
GetMenuItemInfoW
GetCursorPos
GetDesktopWindow
CheckMenuItem
DestroyIcon
LoadBitmapA
GetClassInfoW
CreateWindowExA
MessageBoxW
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
polstore
IPSecFreePolStr
IPSecFreeMulNFAData
IPSecUnassignPolicy
IPSecEnumISAKMPData
IPSecFreeISAKMPData
IPSecEnumPolicyData
IPSecFreeFilterSpec
IPSecGetAssignedPolicyData
IPSecFreeMulNegPolData
gdi32
CreateFontIndirectExW
RemoveFontResourceW
CreateDIBSection
CreateSolidBrush
CreateHatchBrush
CreatePen
CreatePatternBrush
CreateRoundRectRgn
GetMetaFileA
cryptnet
LdapProvOpenStore
Sections
UPX1 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Lc Size: 512B - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vB Size: 5KB - Virtual size: 828KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gNvPZC Size: 4KB - Virtual size: 899KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m Size: 512B - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cFGdVt Size: 4KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 78KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VkTI Size: 1024B - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 145KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nLiuI Size: 2KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ