Behavioral task
behavioral1
Sample
d25e5db9dff244641bc3501c90ed48884d31ff1fbe2530c1766679c8025769d5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d25e5db9dff244641bc3501c90ed48884d31ff1fbe2530c1766679c8025769d5.exe
Resource
win10v2004-20221111-en
General
-
Target
d25e5db9dff244641bc3501c90ed48884d31ff1fbe2530c1766679c8025769d5
-
Size
188KB
-
MD5
a0df757a4fa5b6b37797eb7baedb83f9
-
SHA1
a1be84e2b1635b9845f68d4f68d78d45f319a719
-
SHA256
d25e5db9dff244641bc3501c90ed48884d31ff1fbe2530c1766679c8025769d5
-
SHA512
7801caa9d307c23f360d4b9404c60b14e55c1948a2e6ed63cb1964f9aaa24bdbab5b9c261ac6bf8120fc3dcbdb6b3cf7dc2fdd87e56607c8484959134dcf3d63
-
SSDEEP
3072:WyDeSSN+gF9n9YaaDHWusa2OLjx0LHdBrh++Aq+beafVTtNIXgzyC3LNjdJSEumQ:WyaSSN+gFsa4HMa2+AJA+AqoeciXgWGK
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d25e5db9dff244641bc3501c90ed48884d31ff1fbe2530c1766679c8025769d5.exe windows x86
6065885756bba943e8280c2e981263aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcscat
wcslen
??3@YAXPAX@Z
??2@YAPAXI@Z
wcsncmp
_c_exit
_exit
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
swscanf
advapi32
RegSetValueExW
RegFlushKey
RegDeleteKeyW
RegSetValueW
RegOpenKeyExA
SetFileSecurityW
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
GetAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegSetKeySecurity
RegEnumKeyW
RegQueryValueW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegEnumValueW
RegQueryInfoKeyW
kernel32
LoadLibraryExA
GetVersionExW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetShortPathNameW
GetSystemDefaultUILanguage
LoadLibraryExW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
lstrcmpA
MultiByteToWideChar
LocalFree
LocalAlloc
lstrcpyW
lstrcmpW
lstrcmpiW
GlobalFree
GetLastError
GlobalAlloc
SetFileAttributesW
GetFileAttributesW
lstrcpynW
lstrlenW
ExpandEnvironmentStringsW
CreateDirectoryW
GetModuleHandleW
GetSystemDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
ExitProcess
lstrcpynA
lstrcmpiA
user32
LoadStringW
wsprintfW
GetMenuItemInfoW
GetMenuItemCount
CreatePopupMenu
DestroyMenu
userenv
ord127
ord120
ord128
shlwapi
PathFindExtensionW
ord158
StrStrIW
SHDeleteKeyW
SHCopyKeyW
ord433
PathRemoveExtensionW
PathRemoveBlanksW
PathCombineW
wnsprintfW
StrCmpIW
StrToIntW
SHSetValueW
SHGetValueW
PathAddExtensionW
PathAppendW
ord437
StrCatBuffW
SHDeleteValueW
shell32
SHParseDisplayName
SHBindToParent
ord155
SHGetSpecialFolderLocation
SHChangeNotify
SHGetMalloc
SHSetLocalizedName
SHGetSpecialFolderPathW
SHGetFolderPathW
ole32
CoInitialize
OleUninitialize
OleInitialize
CoCreateInstance
CoUninitialize
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE