Behavioral task
behavioral1
Sample
e7ee006d2ba4205dd54832b17ef6ee0f962fae41bf72303674a0b5ae657f2466.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7ee006d2ba4205dd54832b17ef6ee0f962fae41bf72303674a0b5ae657f2466.exe
Resource
win10v2004-20220901-en
General
-
Target
e7ee006d2ba4205dd54832b17ef6ee0f962fae41bf72303674a0b5ae657f2466
-
Size
1.2MB
-
MD5
18e6e71a73119f2542e4ca251f1e38d7
-
SHA1
82ce521c65c763c23ced53646a67506301466f14
-
SHA256
e7ee006d2ba4205dd54832b17ef6ee0f962fae41bf72303674a0b5ae657f2466
-
SHA512
526fa4db5114efa864ce3e83b4941c9dabbe6cb0ebb64c69c65856461533b69128b8f6a95b151f097714470b76139752512ab504f4e842c3618b2deac26b3408
-
SSDEEP
24576:ufVZNbRn8qUegDibinQoJrv4jIeVvj9HDfa:u9ZD8LD3JrAIeVvE
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e7ee006d2ba4205dd54832b17ef6ee0f962fae41bf72303674a0b5ae657f2466.exe windows x86
2afd23801e042efc43f9f665ef112a75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitThread
HeapSize
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
RtlUnwind
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CreateFileW
SetEnvironmentVariableA
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
WritePrivateProfileStringA
FileTimeToSystemTime
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
InterlockedDecrement
MulDiv
GlobalUnlock
GlobalFree
GetCurrentThread
GlobalLock
GlobalAlloc
ConvertDefaultLocale
EnumResourceLanguagesA
SuspendThread
ResumeThread
SetThreadPriority
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcmpW
lstrcpynA
GetModuleHandleA
SetLastError
LoadLibraryA
GetProcAddress
CompareStringW
CompareStringA
lstrlenW
lstrcmpiA
GetVersion
RaiseException
MultiByteToWideChar
Beep
GetModuleFileNameA
DeleteFileW
lstrcmpA
FormatMessageA
LocalFree
WaitForMultipleObjects
SetEndOfFile
GetOverlappedResult
ResetEvent
SetEvent
CreateEventA
ReadFile
GetLastError
GetFileSize
SetFilePointer
ReleaseSemaphore
CreateThread
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
DeleteCriticalSection
WaitForMultipleObjectsEx
InitializeCriticalSection
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
CreateSemaphoreA
GetPrivateProfileStringA
GetPrivateProfileIntA
DeleteFileA
OpenSemaphoreA
WaitForSingleObject
lstrcpyA
lstrcatA
CloseHandle
lstrlenA
GetLocalTime
GetSystemTime
CreateFileA
WriteFile
Sleep
GetEnvironmentStrings
GetTickCount
user32
RegisterClipboardFormatA
PostThreadMessageA
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowContextHelpId
MapDialogRect
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetCursor
PostQuitMessage
GetMessageA
GetActiveWindow
GetCursorPos
ValidateRect
DestroyMenu
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
GetDlgItemTextA
CheckDlgButton
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
GetPropA
RemovePropA
SendDlgItemMessageA
IsWindow
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
ScreenToClient
ClientToScreen
InvalidateRgn
IsWindowVisible
MoveWindow
GetClientRect
GetWindowRect
CheckMenuItem
CreatePopupMenu
AppendMenuA
UpdateWindow
InvalidateRect
GetParent
EnableWindow
GetMenuItemCount
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
PtInRect
GetWindow
GetDC
CopyRect
ReleaseDC
GetWindowTextLengthA
GetWindowLongA
IsWindowUnicode
SetWindowLongW
IsWindowEnabled
SetFocus
MessageBeep
SetPropA
GetNextDlgGroupItem
SendMessageA
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
wsprintfA
DrawIcon
PostMessageA
IsIconic
GetFocus
LoadIconA
GetScrollBarInfo
GetSystemMetrics
SendMessageW
GetSystemMenu
RegisterWindowMessageA
MessageBoxA
GetComboBoxInfo
GetSysColor
MessageBoxW
EnumChildWindows
CharUpperA
UnregisterClassA
SetWindowLongA
gdi32
GetStockObject
GetTextColor
GetRgnBox
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetMapMode
DeleteObject
SetTextAlign
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
ExtTextOutA
CreateBitmap
SetBkColor
GetClipBox
CreateRectRgnIndirect
GetTextAlign
SetTextColor
CreateBrushIndirect
CreatePenIndirect
GetTextExtentPoint32A
TextOutA
Rectangle
GetBkColor
SelectObject
GetObjectA
CreateFontIndirectA
CreateFontA
CreateRectRgn
CombineRgn
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
CryptGenRandom
CryptAcquireContextA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
CryptReleaseContext
RegSetValueExA
RegCreateKeyExA
shell32
DragQueryFileA
DragQueryPoint
comctl32
ImageList_Destroy
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
CoDisconnectObject
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
oleaut32
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SysAllocString
SysStringLen
SysAllocStringByteLen
SafeArrayDestroy
SystemTimeToVariantTime
LoadTypeLi
OleCreateFontIndirect
Sections
.text Size: 852KB - Virtual size: 849KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_CODE Size: 4KB - Virtual size: 377B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE