Behavioral task
behavioral1
Sample
530b324da4c23490010e03a5d03ecdf7a364fe48f23c293f257d1f63c89bf4ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
530b324da4c23490010e03a5d03ecdf7a364fe48f23c293f257d1f63c89bf4ba.exe
Resource
win10v2004-20220812-en
General
-
Target
530b324da4c23490010e03a5d03ecdf7a364fe48f23c293f257d1f63c89bf4ba
-
Size
224KB
-
MD5
22cc020051060d4c9d728cfb6618ab50
-
SHA1
ae297e4eb71500befe2913ff2a4407338088c422
-
SHA256
530b324da4c23490010e03a5d03ecdf7a364fe48f23c293f257d1f63c89bf4ba
-
SHA512
07a7aa3b210ef68c0b4d04e067639e2ff31b5f6e923ebfe45788359e6a6dfcac35baf2326ba4b3c39d5105550fff0bc5503221ca0895702313bf17e436bb9423
-
SSDEEP
3072:h2UI9ILWzWIwDKk1S7j5qg9oOtVfZiauesnsNW9o5OlvngwUY:UUicPII1S7zHVQlnsNw3lvR
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
530b324da4c23490010e03a5d03ecdf7a364fe48f23c293f257d1f63c89bf4ba.exe windows x86
664126ea733005fe0bedfa2a7669029f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
CompareStringA
SetEndOfFile
ReadFile
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFilePointer
WriteFile
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
CreateFileA
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
VirtualAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetModuleFileNameA
GetVersion
GetStartupInfoA
GetModuleHandleA
GetSystemTime
GetEnvironmentVariableA
GetSystemDirectoryA
CopyFileA
SystemTimeToFileTime
FileTimeToSystemTime
SetLastError
GetVersionExA
lstrcmpiA
lstrlenA
LocalAlloc
CloseHandle
GetCommandLineA
CreateThread
GetLastError
FormatMessageA
LocalFree
GlobalAlloc
GlobalFree
GetLocalTime
LoadLibraryA
Sleep
GetProcAddress
FreeLibrary
SetSystemPowerState
GetCurrentProcess
CreateProcessA
GetTimeZoneInformation
HeapReAlloc
GetExitCodeProcess
FreeEnvironmentStringsW
HeapAlloc
TerminateProcess
ExitProcess
SetEnvironmentVariableA
user32
GetMessageA
ExitWindowsEx
SendMessageA
MessageBoxA
SetTimer
SetCursor
LoadCursorA
SetDlgItemTextA
CheckDlgButton
EndDialog
GetDlgItemTextA
EnableWindow
GetDlgItem
IsDlgButtonChecked
DialogBoxParamA
CheckRadioButton
LoadIconA
EnableMenuItem
ShowWindow
KillTimer
SetForegroundWindow
PostMessageA
TrackPopupMenu
GetSubMenu
GetCursorPos
PostQuitMessage
GetParent
SendDlgItemMessageA
DestroyMenu
LoadMenuA
wsprintfA
IsDialogMessageA
TranslateMessage
DispatchMessageA
CreateDialogParamA
SetWindowTextA
advapi32
SetServiceStatus
LookupPrivilegeValueA
ControlService
QueryServiceStatus
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
InitiateSystemShutdownA
OpenProcessToken
AdjustTokenPrivileges
comdlg32
GetOpenFileNameA
comctl32
InitCommonControlsEx
shell32
Shell_NotifyIconA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
winmm
PlaySoundA
mpr
WNetAddConnection2A
WNetCancelConnection2A
wsock32
WSACleanup
WSAGetLastError
recv
send
setsockopt
sendto
ntohl
inet_addr
ioctlsocket
gethostbyname
connect
shutdown
closesocket
accept
socket
htons
bind
listen
WSAAsyncSelect
WSAStartup
htonl
Sections
.text Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE