Behavioral task
behavioral1
Sample
fdeac2f3d30cf0047d7b2fdc5217d58700955b116bcf1fbe71a792ef5ac5f8eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fdeac2f3d30cf0047d7b2fdc5217d58700955b116bcf1fbe71a792ef5ac5f8eb.exe
Resource
win10v2004-20220812-en
General
-
Target
fdeac2f3d30cf0047d7b2fdc5217d58700955b116bcf1fbe71a792ef5ac5f8eb
-
Size
246KB
-
MD5
d2c08e974c73893112b39bbfc89de669
-
SHA1
7eb9a6ebcc2047704533b0e97ae69edad9730417
-
SHA256
fdeac2f3d30cf0047d7b2fdc5217d58700955b116bcf1fbe71a792ef5ac5f8eb
-
SHA512
55b98185717af79f9f3700dc0eca9308e2c7b120e09331e5005576369769ea7b1be7bfb6c2472f77fd2bb5ca947562d843ba8bdfd0747d2021cfaa6d2c3195de
-
SSDEEP
6144:YeEUq3/sSzA7pfXG7m9ln3T4Y9qd4yqUTJ7nTti:8M7p0mnn3kYYdeUTtpi
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fdeac2f3d30cf0047d7b2fdc5217d58700955b116bcf1fbe71a792ef5ac5f8eb.exe windows x86
b58b33fee3515f8f9be18210cf425a28
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
GlobalAlloc
CreateEventW
OpenEventW
GetCurrentProcessId
CreateSemaphoreW
GetSystemTime
GetModuleFileNameW
GetProcessHeap
HeapCreate
lstrlenA
ExitProcess
GetShortPathNameA
GetModuleFileNameA
MultiByteToWideChar
CreateMutexW
FreeLibrary
LoadLibraryW
GetSystemInfo
GetVersionExA
ExpandEnvironmentStringsW
CreateDirectoryW
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemDirectoryW
LoadLibraryA
GetVolumeInformationW
LocalFree
WaitForMultipleObjects
OpenEventA
GetLastError
GetFileAttributesW
Sleep
InitializeCriticalSection
GetCurrentThread
GetTickCount
SetEvent
WaitForSingleObject
GetCurrentProcess
lstrcpynA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetStartupInfoA
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
GetEnvironmentStringsW
BeginUpdateResourceW
GetProcAddress
user32
CharPrevA
CharUpperA
advapi32
AccessCheck
RegSetValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetTraceEnableLevel
UnregisterTraceGuids
RegisterTraceGuidsA
GetTraceLoggerHandle
GetTraceEnableFlags
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
ReportEventW
DeregisterEventSource
RegisterEventSourceW
DuplicateToken
RevertToSelf
ImpersonateLoggedOnUser
AdjustTokenPrivileges
GetNamedSecurityInfoW
LookupPrivilegeValueA
MapGenericMask
TraceMessage
OpenThreadToken
OpenProcessToken
rpcrt4
RpcServerRegisterIf
RpcServerListen
RpcMgmtStopServerListening
RpcImpersonateClient
RpcServerUnregisterIf
RpcRevertToSelf
RpcServerUseProtseqEpA
NdrServerCall2
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
inseng
DownloadFile
DllGetClassObject
mf3216
Mf3216DllInitialize
Sections
.text Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 102KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 115KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ