Behavioral task
behavioral1
Sample
7c06ffd4b660d7f10b8d73ecdc041297a72faa6de0d962e8acc8aed872e511c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c06ffd4b660d7f10b8d73ecdc041297a72faa6de0d962e8acc8aed872e511c5.exe
Resource
win10v2004-20220812-en
General
-
Target
7c06ffd4b660d7f10b8d73ecdc041297a72faa6de0d962e8acc8aed872e511c5
-
Size
332KB
-
MD5
00344c15161b7200dab0c655bba4a3d0
-
SHA1
65fe1fc04c38254c06a9226e7edd22181635c606
-
SHA256
7c06ffd4b660d7f10b8d73ecdc041297a72faa6de0d962e8acc8aed872e511c5
-
SHA512
7ac3f8b188dbe36b62eba7ff9ea1ca816563b657259337c174e911b74c2f9ceca573ea8658f436c4736ad54b97b083fa2f8d4d32640a447ad18d6ff2a273b4df
-
SSDEEP
6144:OPeyxTlkXhF4HaVbJRdgHgnuoE681zPHM/4/3S7o:OPbZlrHalJRdgHZoEXRs/4v+o
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7c06ffd4b660d7f10b8d73ecdc041297a72faa6de0d962e8acc8aed872e511c5.exe windows x86
5002bceb823d3d7321ac4b2e8ee9f66d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
CryptReleaseContext
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegCreateKeyExA
kernel32
FindFirstFileW
FindResourceA
FindFirstFileA
GetFileAttributesA
GetModuleFileNameW
GetModuleHandleW
SetFileAttributesA
SetFileAttributesW
FindNextFileA
FindNextFileW
DeleteFileW
GetPrivateProfileIntW
GetTempPathA
GetTempPathW
SizeofResource
LockResource
LoadResource
SetLastError
CopyFileA
CopyFileW
RemoveDirectoryA
RemoveDirectoryW
CreateMutexW
CreateFileA
LoadLibraryA
LoadLibraryW
GetPrivateProfileStringA
GetPrivateProfileStringW
CreateProcessW
FindClose
SetErrorMode
DeleteCriticalSection
GetTickCount
IsBadReadPtr
InterlockedExchange
GlobalAddAtomA
GlobalDeleteAtom
GetVersionExA
GetSystemTimeAsFileTime
GetACP
GetVersionExW
QueryPerformanceCounter
QueryPerformanceFrequency
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
GetCurrentProcessId
GetProcessTimes
GetLocalTime
FlushFileBuffers
GetAtomNameA
lstrcmpA
RaiseException
DeleteFileA
CreateFileW
CreateEventW
LocalReAlloc
WaitForSingleObject
CloseHandle
ReleaseMutex
lstrlenA
WideCharToMultiByte
lstrlenW
ExitProcess
Sleep
GetLastError
GetCommandLineA
LocalFree
MultiByteToWideChar
SetUnhandledExceptionFilter
LocalAlloc
GetCommandLineW
GetCurrentThreadId
InitializeCriticalSection
GetModuleHandleA
UnmapViewOfFile
GetCurrentProcess
LeaveCriticalSection
GetPrivateProfileIntA
SetEvent
CreateProcessA
CreateMutexA
lstrcpynA
DuplicateHandle
CreateFileMappingA
CreateEventA
MapViewOfFile
WriteFile
GetModuleFileNameA
EnterCriticalSection
GetProcAddress
SetFilePointer
FreeLibrary
CreateFileMappingW
user32
GetDoubleClickTime
SetTimer
KillTimer
GetSubMenu
EnableMenuItem
GetForegroundWindow
SetForegroundWindow
GetCursorPos
LoadMenuA
SetFocus
RegisterWindowMessageA
IsWindow
GetWindowTextA
DestroyWindow
TranslateMessage
DestroyIcon
CreateWindowExA
CreateWindowExW
DefWindowProcA
DefWindowProcW
DispatchMessageA
FindWindowW
FindWindowExA
FindWindowExW
GetMessageA
GetMessageW
MessageBoxW
GetWindowLongA
GetWindowLongW
LoadCursorA
LoadCursorW
CreateIconFromResource
CreateIconFromResourceEx
LookupIconIdFromDirectoryEx
LoadImageA
LoadImageW
DestroyMenu
DispatchMessageW
TrackPopupMenuEx
LoadStringW
PostMessageA
PostMessageW
PostThreadMessageA
PostThreadMessageW
RegisterWindowMessageW
CharNextA
SendMessageTimeoutA
SendMessageTimeoutW
SetWindowLongA
SetWindowLongW
SystemParametersInfoA
SystemParametersInfoW
RegisterClassExA
RegisterClassExW
GetClassInfoExA
GetClassInfoExW
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadStringA
wvsprintfA
MessageBoxA
gdi32
GetDeviceCaps
GetPaletteEntries
DeleteObject
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE