Behavioral task
behavioral1
Sample
ecd8a2c496dc5c3e455c711d40764bc1fac0759da284ddf360ae70f985ceab74.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ecd8a2c496dc5c3e455c711d40764bc1fac0759da284ddf360ae70f985ceab74.exe
Resource
win10v2004-20220812-en
General
-
Target
ecd8a2c496dc5c3e455c711d40764bc1fac0759da284ddf360ae70f985ceab74
-
Size
416KB
-
MD5
6498fb327c745fc2e30a5b8788b8dc17
-
SHA1
506f4ee2931e4db398b5ebda06233b58d7f058fe
-
SHA256
ecd8a2c496dc5c3e455c711d40764bc1fac0759da284ddf360ae70f985ceab74
-
SHA512
d048ac4f1de4eacbfc4cb89566012f7a9d0ea266e862a33ef327bcb9b88b668558447cb820fa41b9e3d23477e593d14f720c72474e126922bdc612863c9adeab
-
SSDEEP
6144:1u/iQ49yju28rzkqe0TNXlRQOefP4BMz+BNE2aUrK8I7FFA+FTCCBNWC37hxIDTE:QKEj8PM0TmfoMz+QUuhG0W2ID+fJ1
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ecd8a2c496dc5c3e455c711d40764bc1fac0759da284ddf360ae70f985ceab74.exe windows x86
806c9d18b630cb109e7249978ccebe02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
lstrlenA
LoadLibraryA
GetCurrentThreadId
Sleep
SetEnvironmentVariableA
SetEndOfFile
GetOEMCP
GetACP
SetStdHandle
CloseHandle
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetStdHandle
SetHandleCount
GetLastError
CreateFileA
GetModuleHandleA
ReadFile
IsBadWritePtr
GetProcAddress
IsBadCodePtr
VirtualAlloc
VirtualFree
HeapCreate
GetVersionExA
GetCurrentProcess
GetComputerNameA
TerminateProcess
OpenProcess
GetLocalTime
IsBadReadPtr
GetCurrentProcessId
WideCharToMultiByte
GlobalFree
GlobalAlloc
MultiByteToWideChar
SetLastError
UnmapViewOfFile
WriteFile
SetFilePointer
MapViewOfFile
CreateFileMappingA
GetFileSize
DeleteFileA
EnterCriticalSection
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
MoveFileA
GetStartupInfoA
GetCommandLineA
GetVersion
GetSystemTimeAsFileTime
GetFileAttributesA
HeapReAlloc
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
HeapSize
TlsSetValue
TlsAlloc
TlsGetValue
SetUnhandledExceptionFilter
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
lstrcpyA
LoadLibraryA
VirtualAlloc
GetModuleFileNameA
ExitProcess
user32
LoadIconA
SetClassLongA
SetTimer
EndDialog
SetFocus
GetSystemMenu
DeleteMenu
KillTimer
GetDlgItem
EnableWindow
DialogBoxParamA
MessageBoxA
MoveWindow
CreateDialogParamA
SetWindowLongA
GetWindowLongA
GetSystemMetrics
GetWindowRect
SetWindowPos
SetWindowTextA
SetDlgItemTextA
FindWindowA
GetWindowThreadProcessId
ClientToScreen
ShowWindow
GetClientRect
MessageBoxA
comdlg32
GetOpenFileNameA
advapi32
RegSetValueExA
RegOpenKeyExA
shell32
ShellExecuteA
comctl32
ord17
psapi
GetModuleFileNameExA
ole32
OleInitialize
OleCreate
OleSetContainedObject
OleUninitialize
oleaut32
VariantInit
SysAllocString
VariantClear
Sections
.text Size: - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 400KB - Virtual size: 399KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ