Behavioral task
behavioral1
Sample
df5e84da6db85b34f5b28e756112a7224ba350b58166a6a25303bdfff87c5d7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df5e84da6db85b34f5b28e756112a7224ba350b58166a6a25303bdfff87c5d7f.exe
Resource
win10v2004-20220812-en
General
-
Target
df5e84da6db85b34f5b28e756112a7224ba350b58166a6a25303bdfff87c5d7f
-
Size
113KB
-
MD5
ffa3081c343795fee705039452bd5084
-
SHA1
6e910d7cbae32bc5d05c13d62ea88e0f415fe4c3
-
SHA256
df5e84da6db85b34f5b28e756112a7224ba350b58166a6a25303bdfff87c5d7f
-
SHA512
4ce5f6ed10ad353d05da1125b2200230594e087dc103e516a81af5111a56ded707a7bb59063f69061535a0ea1c0f3075b90b079ea62b878950c7ec9eb25ecb0e
-
SSDEEP
1536:+wq+Q4BgSwYuunSLvDTnVfMkX5wsEcjnwqYQ359PY25LQodF8EA9tqG:jxSSwYuuSLbTne3eLP7DdFdMtqG
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
df5e84da6db85b34f5b28e756112a7224ba350b58166a6a25303bdfff87c5d7f.exe windows x86
1a828eaae157d36015e8020d6e45432f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
WriteFile
UnmapViewOfFile
TerminateProcess
Sleep
SizeofResource
SetFileAttributesA
SetEndOfFile
OpenProcess
MapViewOfFile
LockResource
LocalFree
LoadResource
LoadLibraryA
GetVersionExA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetDriveTypeA
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
DeleteFileA
CreateThread
CreateMutexA
CreateFileA
CopyFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
lstrlenA
GetThreadLocale
GetStartupInfoA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
user32
CreateWindowExA
TranslateMessage
SetTimer
SendMessageA
RegisterClassA
PostQuitMessage
PostMessageA
LoadIconA
LoadCursorA
KillTimer
GetWindowTextA
GetMessageA
GetDesktopWindow
FindWindowExA
FindWindowA
DispatchMessageA
DefWindowProcA
CharUpperBuffA
GetKeyboardType
MessageBoxA
wininet
InternetGetConnectedState
DeleteUrlCacheEntry
Sections
UPX0 Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE