Behavioral task
behavioral1
Sample
d439f5e4e093f2018a170a8db0960abe8568b4de0b6bcac4da0102ddf55de819.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d439f5e4e093f2018a170a8db0960abe8568b4de0b6bcac4da0102ddf55de819.exe
Resource
win10v2004-20220812-en
General
-
Target
d439f5e4e093f2018a170a8db0960abe8568b4de0b6bcac4da0102ddf55de819
-
Size
608KB
-
MD5
0678ac3179399482e5329edfc5dbccd0
-
SHA1
fb0c660d872d8f0a45ffdcff44cbcdffb727bb53
-
SHA256
d439f5e4e093f2018a170a8db0960abe8568b4de0b6bcac4da0102ddf55de819
-
SHA512
063a4df59a9f3bc9db7518dcd7d61ba5a4a657e386e19518a4a0cbf70a43f04a367be5a56e99eaddd915a2b9b31ac0c66ecfb76d2ff9fe7621e403f2b00e2848
-
SSDEEP
12288:eTx5KRZ18xtSP+szdcIugOO50MMEMOkP+CFlwDuwz5Z2Mo:bmxtSP+sJ+O5FWPP+CFlwDLz5Z2f
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d439f5e4e093f2018a170a8db0960abe8568b4de0b6bcac4da0102ddf55de819.exe windows x86
670ae0d1692589f452ed57856009db18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
kernel32
lstrlenW
LocalFree
GetFileAttributesW
ExpandEnvironmentStringsW
GetProcessHeap
FreeLibrary
GetProcAddress
GetLastError
HeapSetInformation
GetCommandLineW
DelayLoadFailureHook
InterlockedCompareExchange
LoadLibraryExA
HeapFree
LoadLibraryW
WideCharToMultiByte
LocalAlloc
IsDBCSLeadByte
RegisterApplicationRestart
lstrlenA
HeapAlloc
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
Sleep
InterlockedExchange
gdi32
GetStockObject
user32
CreateWindowExW
MessageBoxW
LoadCursorW
DefWindowProcW
PostQuitMessage
RegisterClassW
LoadIconW
LoadStringW
msvcrt
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
__setusermatherr
_exit
_cexit
__getmainargs
memset
__p__commode
__p__fmode
_XcptFilter
memcpy
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
_controlfp
shell32
CommandLineToArgvW
shlwapi
StrCmpIW
PathRemoveFileSpecW
PathFindExtensionW
StrCmpNIW
PathAppendW
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 488KB - Virtual size: 487KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE