Behavioral task
behavioral1
Sample
958096dd6eb76d439ae0cbc7fed07ebda7c28189014f42ca69fe0aeb98c20496.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
958096dd6eb76d439ae0cbc7fed07ebda7c28189014f42ca69fe0aeb98c20496.exe
Resource
win10v2004-20220812-en
General
-
Target
958096dd6eb76d439ae0cbc7fed07ebda7c28189014f42ca69fe0aeb98c20496
-
Size
112KB
-
MD5
0c4e54d7657fff0379c936e8c32e796c
-
SHA1
ef8c39c2f6f164f9f7c16e35ea17cb322eac8bb3
-
SHA256
958096dd6eb76d439ae0cbc7fed07ebda7c28189014f42ca69fe0aeb98c20496
-
SHA512
27e4069d9eab4b8fb86567639d783d22a36c77a8adb8acc710d648397f4d6054b9ecc21d551fbacf368411d6b98c54f6deeda8033fd8ce1271ce64f3eae22bba
-
SSDEEP
3072:QxnwIZdeylsktMQygft3g2Tm+zTH2RNknY615rYl2BErJh:QxDzlsktpLt3FVHfY6153mrv
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
958096dd6eb76d439ae0cbc7fed07ebda7c28189014f42ca69fe0aeb98c20496.exe windows x86
f433e7fcc51e68080022754836705744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
UPX0 Size: - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
i9ytlmvr Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xsdhsrek Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eg.ppz4k Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ