Behavioral task
behavioral1
Sample
9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4.exe
Resource
win10v2004-20220901-en
General
-
Target
9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4
-
Size
250KB
-
MD5
4e3551a05ae8766630458c952578d677
-
SHA1
ad45e73b9139c293d2616a3293809c6e8072baca
-
SHA256
9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4
-
SHA512
22a461df0d4e030ba36c3e6c0cc652da4c09018e3a0af5e17dd2a0d37bb71e8f293d1faee5083ef49fd4e0329089a47e33f097e28102c154a6472e606f10876c
-
SSDEEP
3072:MGOFLomQsQtM25LSF12LT8nsQqIbSC3IzSNGOsDGLCpIfMhlGV6T3A/tROoHniXb:KXxQtJ2FSBYr3gOrEhdT3A/tROoHLQ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9f458556607cf619db63f7147e9b46ea132cd542baef6e9a88b012adf0d822e4.exe windows x86
6ddcb287ba714291286e6072be43ad97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
ExpandEnvironmentStringsW
LoadLibraryA
GetSystemDirectoryW
GetWindowsDirectoryW
GetFileAttributesW
GetModuleFileNameW
lstrcatW
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentThreadId
GetVersionExA
TlsAlloc
GetModuleHandleA
MultiByteToWideChar
ExitProcess
HeapCreate
SetUnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentStringsW
GetCPInfo
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetSystemInfo
InitializeCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsBadCodePtr
GetLocalTime
GetProcAddress
advapi32
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegEnumValueW
mssip32
CryptSIPVerifyIndirectData
CryptSIPGetRegWorkingFlags
inseng
PurgeDownloadDirectory
Sections
.text Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX1 Size: 101KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 115KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ