Behavioral task
behavioral1
Sample
c24e31dc76cee661c9ec5806eabe3c79dd1344071ff1db1aa94a61b91e2f2cb7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c24e31dc76cee661c9ec5806eabe3c79dd1344071ff1db1aa94a61b91e2f2cb7.exe
Resource
win10v2004-20220812-en
General
-
Target
c24e31dc76cee661c9ec5806eabe3c79dd1344071ff1db1aa94a61b91e2f2cb7
-
Size
117KB
-
MD5
898643b05c97b47a81046d4d9412abfa
-
SHA1
c5b5c574868ed36437288e6d0508ffa5edc28435
-
SHA256
c24e31dc76cee661c9ec5806eabe3c79dd1344071ff1db1aa94a61b91e2f2cb7
-
SHA512
8f3b6da35c25a2857db401b6388180084523b8209bc774ef03dd2f06e39541abfb628ce2e0be3a8de6b305e9c096fae07cb0eb43d94b13ac79534256e3e4a23b
-
SSDEEP
1536:NlW0wGQb3a3rQGiP02KzU5p2Cka9ypFKZaRHKfuE+ztaz1GdymBLQlytc5dcMhAh:PW0nw9051Op6czAquyQFw4/P0q
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c24e31dc76cee661c9ec5806eabe3c79dd1344071ff1db1aa94a61b91e2f2cb7.exe windows x86
f404f83e6556174f2c1ce93a16bcff11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetShortPathNameA
lstrcpyA
lstrcatA
GetSystemDirectoryA
GetEnvironmentVariableA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyA
msvcrt
strcat
strcpy
strlen
Sections
UPX0 Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE