Behavioral task
behavioral1
Sample
f12ba9bf02f95a20e9322cb0d24e83f912b4abad9f89780624d43dbb6e4684a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f12ba9bf02f95a20e9322cb0d24e83f912b4abad9f89780624d43dbb6e4684a7.exe
Resource
win10v2004-20220812-en
General
-
Target
f12ba9bf02f95a20e9322cb0d24e83f912b4abad9f89780624d43dbb6e4684a7
-
Size
276KB
-
MD5
24b712fe057816c418cd7a3e30f326f0
-
SHA1
4715108520c3e7b1c525abf99a6702211a122748
-
SHA256
f12ba9bf02f95a20e9322cb0d24e83f912b4abad9f89780624d43dbb6e4684a7
-
SHA512
d5a7c6b29aefa5c0486695a197bde275ff17bda950b680f039b82b6bd56d39dce2cc4e5bb050c88ac5a6726c5d6e032d14a7e06db47a958173dfe73a7b6873f7
-
SSDEEP
6144:V4P885qxrnbQR8vhTcqHR18lGk9mi+BAENW958AwV:Va8VxDbbvhpHuGfZBAR51wV
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f12ba9bf02f95a20e9322cb0d24e83f912b4abad9f89780624d43dbb6e4684a7.exe windows x86
3ff5a8be29653527e738cd256f4d599f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
CreateMutexA
GetProcAddress
user32
GetSystemMetrics
GetMenuItemCount
AppendMenuW
InvalidateRgn
SetForegroundWindow
SetDlgItemTextW
SetActiveWindow
SetMenu
CreateAcceleratorTableA
DefWindowProcA
OffsetRect
RegisterClassW
GetCapture
RegisterClassExW
SetFocus
IsMenu
DialogBoxIndirectParamA
IsIconic
GetMenuItemInfoW
GetCursorPos
GetDesktopWindow
CheckMenuItem
DestroyIcon
LoadBitmapA
GetClassInfoW
CreateWindowExA
MessageBoxW
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
polstore
IPSecFreePolStr
IPSecFreeMulNFAData
IPSecUnassignPolicy
IPSecEnumISAKMPData
IPSecFreeISAKMPData
IPSecEnumPolicyData
IPSecFreeFilterSpec
IPSecGetAssignedPolicyData
IPSecFreeMulNegPolData
gdi32
CreateFontIndirectExW
RemoveFontResourceW
CreateDIBSection
CreateSolidBrush
CreateHatchBrush
CreatePen
CreatePatternBrush
CreateRoundRectRgn
GetMetaFileA
cryptnet
LdapProvOpenStore
Sections
UPX1 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Lc Size: 512B - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vB Size: 5KB - Virtual size: 828KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gNvPZC Size: 4KB - Virtual size: 899KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m Size: 512B - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cFGdVt Size: 4KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 78KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VkTI Size: 1024B - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 145KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nLiuI Size: 2KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ