Behavioral task
behavioral1
Sample
8c09249807f353752f697c9988166d175bab4dad50314afd7846ed3e0f046db6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c09249807f353752f697c9988166d175bab4dad50314afd7846ed3e0f046db6.exe
Resource
win10v2004-20220812-en
General
-
Target
8c09249807f353752f697c9988166d175bab4dad50314afd7846ed3e0f046db6
-
Size
262KB
-
MD5
1a917b3342cef28771f7ed1ff8846370
-
SHA1
f0b0e945cb3c50f592d9c62302f0aba46a54ef7e
-
SHA256
8c09249807f353752f697c9988166d175bab4dad50314afd7846ed3e0f046db6
-
SHA512
e1d780ba5f5f8b70e9c2e99bad13b243464b3f669ec6f6f2f413f6dd870adbe1944eaed32ebfec7fbae6497803f03d59bb36030688465318f6a5e557946ecf1d
-
SSDEEP
3072:B8nW6fb/CH1pGLP7c7pJ1GE7am88d5Bt9pTlNg8pPD4Cqykp/v35aYV1kOOkSCWc:2WQ6HWLs+Eum1RNrkCqddcGRW4P
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8c09249807f353752f697c9988166d175bab4dad50314afd7846ed3e0f046db6.exe windows x86
6119484eb7fe272ec4097aa083b0f58a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
ExitProcess
GetCurrentProcess
GetCurrentThreadId
TlsAlloc
GetLastError
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapCreate
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetModuleHandleW
GetProcAddress
scecli
SceStartTransaction
SceProcessSecurityPolicyGPO
SceGetServerProductType
InitializeChangeNotify
SceSvcFree
SceGetObjectSecurity
SceSetupRootSecurity
qdvd
DllRegisterServer
DllGetClassObject
DllCanUnloadNow
Sections
UPX0 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.FojB Size: 4KB - Virtual size: 937KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BUlqb Size: 2KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VYMzqI Size: 2KB - Virtual size: 337KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 94KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wVqnBj Size: 4KB - Virtual size: 792KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 124KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ