Behavioral task
behavioral1
Sample
9db7108abd83f233038a162032b9176b5aa308d1874b566e3e507898b0891e45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9db7108abd83f233038a162032b9176b5aa308d1874b566e3e507898b0891e45.exe
Resource
win10v2004-20221111-en
General
-
Target
9db7108abd83f233038a162032b9176b5aa308d1874b566e3e507898b0891e45
-
Size
72KB
-
MD5
7ff4894ab9f57d43f0f4b2c91667c37c
-
SHA1
377c62eba6eb1b03435494ee5b71b555b31f5e7a
-
SHA256
9db7108abd83f233038a162032b9176b5aa308d1874b566e3e507898b0891e45
-
SHA512
543666cb7b8cfccaba974bf86c31fd89cf3395556cab90b10caee79e03179aa98f2e5fa4c85d1f0d22b31c01f0a9733d88fb6abeb1303e7f14c7e6facaede1b1
-
SSDEEP
768:FtEq9yEJ2Y+Te6Qiyw33awdVmdlNdn9veP19VCSzlKR1E6dPSitzI0BcFl7t:nEqwEATe52SvP9eJIEtiu0c
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9db7108abd83f233038a162032b9176b5aa308d1874b566e3e507898b0891e45.exe windows x86
bddd68652eaa6e8f09f3baf376dc98b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
VirtualQuery
Sleep
SetThreadPriority
SetFileAttributesA
MultiByteToWideChar
MoveFileA
GetWindowsDirectoryA
GetVersionExA
GetThreadLocale
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentThread
GetCPInfo
FormatMessageA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
DeleteFileA
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
GetModuleFileNameA
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
lstrcpyA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
ole32
CoUninitialize
CoInitialize
oleaut32
GetErrorInfo
SysFreeString
VariantChangeTypeEx
VariantCopyInd
VariantClear
SysStringLen
SysFreeString
SysReAllocStringLen
SysAllocStringLen
user32
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
MessageBoxA
LoadStringA
GetSystemMetrics
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE