Behavioral task
behavioral1
Sample
c2e6a5613b377fe282d7604c1eab297fb8badda784eaaf9a998da74724a5fc7f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c2e6a5613b377fe282d7604c1eab297fb8badda784eaaf9a998da74724a5fc7f.exe
Resource
win10v2004-20221111-en
General
-
Target
c2e6a5613b377fe282d7604c1eab297fb8badda784eaaf9a998da74724a5fc7f
-
Size
131KB
-
MD5
8f28d02c77b0182329e3c8e905ce0c00
-
SHA1
f46ca1a833577e4e649e3e3ffd4c7062c1dac5bf
-
SHA256
c2e6a5613b377fe282d7604c1eab297fb8badda784eaaf9a998da74724a5fc7f
-
SHA512
0de7c4a906b875d299a7c495ade7fe89ab5077c2039a6d484e8b08341afd8b9b10fbf6d5250f1f1d3042cc1b2ea51213f1d7483675b35891430e6ccb374ece2e
-
SSDEEP
3072:7dkWGqzjTAUJsxq4HRBRdG9aLtfFfmHn7uMqnzWEldlhragA:x1GqzBOqqdzNfSnaMKz9ldlhrU
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c2e6a5613b377fe282d7604c1eab297fb8badda784eaaf9a998da74724a5fc7f.exe windows x86
f0d4d888365525da27840d92b16e9939
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
_acmdln
__set_app_type
_controlfp
_except_handler3
exit
_XcptFilter
_cexit
_exit
__p__fmode
_c_exit
kernel32
GetModuleHandleA
GetStartupInfoA
hypertrm
MessageLoop
InitInstance
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE