Behavioral task
behavioral1
Sample
Keygen.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Keygen.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
_Keygen.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
_Keygen.exe
Resource
win10v2004-20220901-en
General
-
Target
a7d263f50f525ffc6dc9b55c43b3c37b6bd1653d98dfc74a2eb76bc74252e1f4
-
Size
241KB
-
MD5
ebe41fc598ec9fd83d905c330c6c8b40
-
SHA1
55d60e456df818b792a01cefa48bf7b0df6db416
-
SHA256
a7d263f50f525ffc6dc9b55c43b3c37b6bd1653d98dfc74a2eb76bc74252e1f4
-
SHA512
62fcd15aaec1e3ca97d3c0f8ff2ad9cd0c6833ca1dac4c8e934c1e4d6cd9db12aaffd7a9d9d2d455cad2b84575c8ea42fd320ad81252c0df74ce814334d1f47d
-
SSDEEP
6144:LE8NASWQ/+NE52Aq94avE5/oPR7hvHd3YH6:mlNI2L4av8/ofv93q6
Malware Config
Signatures
-
resource yara_rule static1/unpack001/_Keygen.exe upx
Files
-
a7d263f50f525ffc6dc9b55c43b3c37b6bd1653d98dfc74a2eb76bc74252e1f4.cab
-
BRX58160
-
BRX78340
-
ExplosionTex
-
Keygen.exe.exe windows x86
a7df1250efa97eb496f7f456aeb58add
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
SetCurrentDirectoryA
MoveFileExA
OpenProcess
Process32Next
Process32First
GetCurrentProcessId
CreateToolhelp32Snapshot
DeleteFileA
GetLocalTime
GetWindowsDirectoryA
WriteFile
lstrcpyA
GetSystemDirectoryA
lstrcmpA
GetCommandLineA
GetVersionExA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
ReadFile
SetFilePointer
GetFileSize
GetTickCount
GetCurrentThreadId
QueryPerformanceCounter
LCMapStringW
SetFileTime
CloseHandle
lstrlenA
GlobalAlloc
CreateProcessA
lstrcpynA
GlobalFree
GetSystemTimeAsFileTime
LCMapStringA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetStartupInfoA
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
HeapReAlloc
HeapAlloc
HeapSize
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
user32
MessageBoxA
wsprintfA
advapi32
GetTokenInformation
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenProcessToken
shell32
ShellExecuteExA
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
MISC30
-
_Keygen.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
cvx6450
-
fuistq
-
idudpbase