?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
Behavioral task
behavioral1
Sample
096828da00173776f66e4ba03ebe49a634ec28625ffe5c9d609ef5962406c8db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
096828da00173776f66e4ba03ebe49a634ec28625ffe5c9d609ef5962406c8db.exe
Resource
win10v2004-20220812-en
Target
096828da00173776f66e4ba03ebe49a634ec28625ffe5c9d609ef5962406c8db
Size
240KB
MD5
e6ed4c3d7a6c17b3ee913305db634c7c
SHA1
9d3df34e4e9af5d5e32c11dc36a0ad8383e7ea6f
SHA256
096828da00173776f66e4ba03ebe49a634ec28625ffe5c9d609ef5962406c8db
SHA512
aee314f1c8119a67e9e2a66299198922b760458bb52e90bcfc90c281e2da6acb6b9e1ad2c78f974da87be9c52e769a9f2ad06d44743700f07fb6bc3de64a98ca
SSDEEP
6144:apcm9Vm5viOatvML6sk2dp8G5xOZ1sx1SHyUR++NZLo+zZR:ac285vM92dkyp8G54+SqaL1zZR
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
_except_handler3
GetModuleBaseNameA
GetProcessHeap
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
VirtualAlloc
GlobalFree
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
CompareStringA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
VirtualFree
GetCurrentProcess
CreateSemaphoreA
WaitForSingleObject
ReleaseSemaphore
CreateFileA
GetFileSize
HeapAlloc
VirtualQuery
HeapFree
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
GetForegroundWindow
SendMessageA
DrawIcon
GetWindowRect
DestroyWindow
SetWindowTextA
UpdateWindow
SetScrollInfo
ModifyMenuA
GetActiveWindow
DrawTextA
GetWindowInfo
ReleaseDC
SetWindowPos
MoveWindow
FindWindowA
GetDC
BeginPath
EndPath
TextOutA
MoveToEx
BitBlt
LineTo
DeleteDC
SelectObject
CreateCompatibleDC
Polyline
CreatePen
GetPath
PolyDraw
?MainOneFunc@@YGPAXKK@Z
?MainTwoFunc@@YGPAXKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE