Behavioral task
behavioral1
Sample
660573125504c5e5f6cfe849364628a4f4964b2739539447adc8f14e807db9f8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
660573125504c5e5f6cfe849364628a4f4964b2739539447adc8f14e807db9f8.exe
Resource
win10v2004-20220901-en
General
-
Target
660573125504c5e5f6cfe849364628a4f4964b2739539447adc8f14e807db9f8
-
Size
174KB
-
MD5
4c43e90c94db44d134178d58a2a9da40
-
SHA1
d1e6d511035e3012cdbf9fb102898d68c7e24f3c
-
SHA256
660573125504c5e5f6cfe849364628a4f4964b2739539447adc8f14e807db9f8
-
SHA512
c4fb6fe8272c8ad269b64fc41105f3c97fed29c015b9559bcf3ea7d3833e647cd11c4584fed519e1ee88dd429dbf5fa3f014c21aa02240f7e350d83a6bc03d23
-
SSDEEP
3072:53/0o8W/avKnnuAs1T0qm5evM3SAVARch1jsF1rRq:5v0iaInniESAVcmP
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
660573125504c5e5f6cfe849364628a4f4964b2739539447adc8f14e807db9f8.exe windows x86
9444b5b77ad5109742b965d76e1d87b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
GetCPInfo
GetOEMCP
SetErrorMode
FileTimeToSystemTime
FileTimeToLocalFileTime
GetProcessVersion
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
RaiseException
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WritePrivateProfileStringA
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sleep
FreeLibrary
SetLastError
InterlockedIncrement
InterlockedDecrement
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
LocalFree
GetProfileStringA
GlobalFlags
GetFileAttributesA
GetFileTime
GetFileSize
TlsSetValue
TlsGetValue
LocalReAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
DeleteCriticalSection
TlsFree
GlobalHandle
LocalAlloc
TlsAlloc
InitializeCriticalSection
FindFirstFileA
GetFullPathNameA
GetVolumeInformationA
FindClose
LockFile
SetEndOfFile
UnlockFile
WriteFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
ReadFile
CreateFileA
SetHandleCount
GetLastError
DuplicateHandle
GetCurrentThreadId
lstrcpynA
GetStdHandle
GetVersion
MulDiv
LoadLibraryA
GlobalAddAtomA
lstrcatA
GlobalGetAtomNameA
GetModuleHandleA
GlobalFindAtomA
lstrcpyA
GlobalFree
GetProcAddress
GlobalUnlock
LoadResource
LockResource
FindResourceA
WinExec
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetFileType
HeapDestroy
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
comctl32
comdlg32
GetFileTitleA
gdi32
GetClipBox
CreateBitmap
SetTextColor
SetBkColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
CreateSolidBrush
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
CreateCompatibleDC
BitBlt
CreateDIBitmap
GetTextExtentPointA
PatBlt
user32
CopyRect
ScreenToClient
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
LoadStringA
DestroyMenu
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
InvalidateRect
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemID
GetWindowTextLengthA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
SetTimer
KillTimer
WaitMessage
PeekMessageA
DispatchMessageA
EnableWindow
FindWindowA
GetWindow
GetWindowTextA
GetDlgItem
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
GetMenuItemCount
GetSubMenu
IntersectRect
OffsetRect
EndDialog
DefWindowProcA
ExcludeUpdateRgn
UnregisterClassA
HideCaret
ShowCaret
IsWindowUnicode
DrawFocusRect
DefDlgProcA
InflateRect
CharNextA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
wsock32
htonl
gethostbyname
recv
send
htons
closesocket
WSACleanup
recvfrom
sendto
bind
connect
inet_addr
accept
WSAGetLastError
WSASetLastError
WSAStartup
WSAAsyncSelect
ioctlsocket
socket
Sections
UPX0 Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE