Behavioral task
behavioral1
Sample
a2ceec0b83b16045146470c889913811bfa53a605b979229f9302de89ae33fbc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2ceec0b83b16045146470c889913811bfa53a605b979229f9302de89ae33fbc.exe
Resource
win10v2004-20220901-en
General
-
Target
a2ceec0b83b16045146470c889913811bfa53a605b979229f9302de89ae33fbc
-
Size
83KB
-
MD5
a9974f832b0cfaabd36b19096b59f38e
-
SHA1
998a6944b9f9f9d478b585b9f9b2a17b361a7ee0
-
SHA256
a2ceec0b83b16045146470c889913811bfa53a605b979229f9302de89ae33fbc
-
SHA512
2bdfa8c90582eed5e906f19a83082a07c272f69fbce28b9ff88c26faa3bbe088251eb0ab5254fdd0aa3f1770b157a813c399b65e644683ae55ccbade7b244488
-
SSDEEP
384:j482qVBklrpizdY28HNIJDzOtuHewc25gkOYBSSRKeBnlP5:j4dqol4m2EIJnOtCp/d4eBnn
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a2ceec0b83b16045146470c889913811bfa53a605b979229f9302de89ae33fbc.exe windows x86
4807b9b5842707e9264518f7f7ce498a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetVersionExA
HeapAlloc
HeapFree
LoadLibraryA
LocalAlloc
LocalFree
MultiByteToWideChar
Sleep
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegSetValueExA
RegCloseKey
RegOpenKeyA
gdi32
SetBkMode
SetTextColor
CreateSolidBrush
ole32
CoInitialize
CoUninitialize
shell32
SHGetSpecialFolderPathA
user32
DefWindowProcA
DialogBoxParamA
ShowWindow
SetDlgItemTextA
SetCursor
SetClassLongA
MessageBoxA
LoadCursorA
GetDlgItem
FindWindowExA
EndDialog
EnumWindows
wsprintfA
winmm
timeGetTime
Sections
UPX0 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE