Behavioral task
behavioral1
Sample
b78c383acfa943887a74453a7a8582d0cbdeb67c8eac255aa6f2dcaac12f7b29.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b78c383acfa943887a74453a7a8582d0cbdeb67c8eac255aa6f2dcaac12f7b29.exe
Resource
win10v2004-20221111-en
General
-
Target
b78c383acfa943887a74453a7a8582d0cbdeb67c8eac255aa6f2dcaac12f7b29
-
Size
287KB
-
MD5
ae0757d8476ae7b7e80e62bb0180b220
-
SHA1
fe0bddde09181cb72e038994de1dad3bd6897528
-
SHA256
b78c383acfa943887a74453a7a8582d0cbdeb67c8eac255aa6f2dcaac12f7b29
-
SHA512
2ac35bf822da12d2f600b0d5017ba750c926fb3f465166dc20fc92cdb85803eb283fe30a66414e854af9c6cb3ea9369ee701d451c8675961466980c35580b2fd
-
SSDEEP
6144:GvgtWjV+k2o1iYZE3+o2/84uClsEGpdaGcwubzpNj9VHFQ3:5tcV+k2o1fZWOkhOGGG+3fw
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b78c383acfa943887a74453a7a8582d0cbdeb67c8eac255aa6f2dcaac12f7b29.exe windows x86
b3082620fcaaff56ea0144da2aed839e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
ExitProcess
LocalAlloc
LocalFree
CreateFileA
SetFilePointer
CloseHandle
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
WriteFile
DeleteFileA
CreateDirectoryA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
WinExec
lstrcpyA
lstrcpynA
lstrcatA
lstrlenA
user32
MessageBoxA
shell32
ShellExecuteA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
UPX0 Size: - Virtual size: 428KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 277KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yygw Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE