Behavioral task
behavioral1
Sample
a5f74b4d8115692e5e131860cd30dd2a4e6ef25458eddda8c5b6eca41ecf3b09.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5f74b4d8115692e5e131860cd30dd2a4e6ef25458eddda8c5b6eca41ecf3b09.exe
Resource
win10v2004-20220812-en
General
-
Target
a5f74b4d8115692e5e131860cd30dd2a4e6ef25458eddda8c5b6eca41ecf3b09
-
Size
22KB
-
MD5
bffa08e6048550d469be0f36a49e7ee1
-
SHA1
031fbf5bd3612e4fa47931473c1cd616d9a6eccf
-
SHA256
a5f74b4d8115692e5e131860cd30dd2a4e6ef25458eddda8c5b6eca41ecf3b09
-
SHA512
4d47add443ed6d068fcfda03d57bb51f90cccf24f05f5a480a5014ae6db4cf9f314b509f711451dbed8d81138e0443527befab8e9954ec59af05635201a849ff
-
SSDEEP
192:MDwE+cU5WQGicXc6KC/3mOywfGLPTjDcDmsP2XO7IfHFSpD7vzF67GLShLCv:JcU5WZcs/3mTwfGfjDg7ccf87GELCv
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a5f74b4d8115692e5e131860cd30dd2a4e6ef25458eddda8c5b6eca41ecf3b09.exe windows x86
4d216fb964fc8f386321d630367b8ab8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GlobalAlloc
GetFileSize
GlobalFree
lstrlenA
lstrcatA
lstrcmpA
GetSystemTime
lstrcpyA
CloseHandle
WriteFile
GetVersionExA
CreateFileA
DeleteFileA
GetTimeFormatA
SetFilePointer
ReadFile
GetDateFormatA
Sleep
advapi32
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
rasapi32
RasEnumConnectionsA
user32
wsprintfA
PostQuitMessage
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetGetConnectedState
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE