Behavioral task
behavioral1
Sample
e47e74cb61bbd7acdc4171c3091862ced79dcfb9e4d1269de5b996f292f152d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e47e74cb61bbd7acdc4171c3091862ced79dcfb9e4d1269de5b996f292f152d9.exe
Resource
win10v2004-20220901-en
General
-
Target
e47e74cb61bbd7acdc4171c3091862ced79dcfb9e4d1269de5b996f292f152d9
-
Size
29KB
-
MD5
bb42c89bde4d19649a8c9ac61133b052
-
SHA1
a02e35547a4beb75fa9ad779129ac4723a50c832
-
SHA256
e47e74cb61bbd7acdc4171c3091862ced79dcfb9e4d1269de5b996f292f152d9
-
SHA512
3437c3dc23b5b5be1849c1b208f03d1cc622569a5a7f2428025d30fe819d4135a36f339bb15bbcf8c0dd9108e98318fd27d211f0ec618a81f1e0af6392b0eb94
-
SSDEEP
384:TZsMTSDU3ZWZMJFppbBxoXVTZvgWGCI3yzOPwp:BmDEvppteTib3yzDp
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e47e74cb61bbd7acdc4171c3091862ced79dcfb9e4d1269de5b996f292f152d9.exe windows x86
1c6a73741a8c84b31d3220cd38ea422d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
GetWindowsDirectoryA
GetSystemTime
Sleep
CreateProcessA
MoveFileA
CopyFileA
TerminateProcess
CreateFileA
OpenProcess
SetFileAttributesA
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
GetCommandLineA
GetStartupInfoA
WriteFile
DeleteFileA
CloseHandle
WinExec
GetModuleFileNameA
GetCurrentProcess
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryA
lstrcatA
GetLastError
GetModuleHandleA
ExitProcess
HeapFree
ReadFile
HeapAlloc
GetProcessHeap
GetFileSize
GetLocalTime
lstrlenA
WritePrivateProfileStringA
GetPrivateProfileStringA
SetFilePointer
lstrcmpiA
advapi32
LookupPrivilegeValueA
StartServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
ChangeServiceConfigA
ChangeServiceConfig2A
OpenProcessToken
AdjustTokenPrivileges
psapi
GetModuleFileNameExA
user32
wsprintfA
CharUpperBuffA
MessageBoxA
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE