Behavioral task
behavioral1
Sample
b5e75b4f14debe859f8b76412ab191b0daf29d910c61e4f66a944bcbcdb7b1e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5e75b4f14debe859f8b76412ab191b0daf29d910c61e4f66a944bcbcdb7b1e9.exe
Resource
win10v2004-20221111-en
General
-
Target
b5e75b4f14debe859f8b76412ab191b0daf29d910c61e4f66a944bcbcdb7b1e9
-
Size
1.4MB
-
MD5
360ae21701ef41959358095f6cc67881
-
SHA1
737d23671312a1d350d4a2e8c6bfda845c03a385
-
SHA256
b5e75b4f14debe859f8b76412ab191b0daf29d910c61e4f66a944bcbcdb7b1e9
-
SHA512
241fcca8c42ff81c3d78c3d7693eb1bd50355d5517c7dcf8ad01f62362b8edca47ebf713b858f57f1bef5acdb8921cb8cb7f1fcf07a940179f7143b4e0004900
-
SSDEEP
12288:fdpJ16Gna4r6kj5uIuIuMLLZLiIU/fsh4V6jnB0KJFx+I3IxAOzK6+44EwgwIVMY:fdpJxZlhhHLLiAySFurIA/BI/M
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b5e75b4f14debe859f8b76412ab191b0daf29d910c61e4f66a944bcbcdb7b1e9.exe windows x86
8056a0dd1801858eacfb684462e97775
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
RegFlushKey
RegDeleteValueW
RegNotifyChangeKeyValue
kernel32
InitializeCriticalSection
GetFileAttributesW
GetModuleFileNameW
DeleteCriticalSection
CloseHandle
HeapFree
HeapAlloc
GetProcessHeap
lstrcpyW
lstrcmpW
GetWindowsDirectoryW
CompareFileTime
lstrlenA
GetVersionExW
WaitForMultipleObjects
WaitForSingleObject
SetEvent
GetCurrentThreadId
FreeLibrary
LoadLibraryW
Sleep
GetCommandLineW
CreateEventW
GetSystemInfo
GetFullPathNameW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapReAlloc
RtlUnwind
ExitThread
TlsSetValue
TlsGetValue
GetLastError
CreateThread
InterlockedDecrement
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetCurrentDirectoryW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsFree
SetLastError
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
VirtualProtect
MultiByteToWideChar
IsBadReadPtr
IsBadCodePtr
SetFilePointer
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
CreateFileW
SetEndOfFile
ReadFile
GetEnvironmentStrings
GetSystemDirectoryW
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
lstrlenW
ExitProcess
gdi32
GetTextExtentPointW
user32
GetKeyState
DestroyWindow
MessageBoxA
wsprintfA
LoadStringA
SetDlgItemTextW
ShowWindow
CheckDlgButton
SetWindowTextW
ReleaseDC
GetDC
SetDlgItemInt
GetDlgItemInt
GetDlgItemTextW
CheckRadioButton
LoadIconW
SetForegroundWindow
KillTimer
SetTimer
SetFocus
CallNextHookEx
IsWindowEnabled
AdjustWindowRectEx
GetWindowRect
CreateDialogParamW
GetClientRect
UpdateWindow
PostQuitMessage
UnhookWindowsHookEx
SetWindowsHookExW
DispatchMessageW
TranslateMessage
IsDialogMessageW
PeekMessageW
MsgWaitForMultipleObjects
GetDesktopWindow
LoadStringW
MessageBoxW
GetDlgItem
SendMessageW
EnableWindow
GetWindowLongW
DialogBoxParamW
SetWindowPos
PostMessageW
EndDialog
GetFocus
wsprintfW
comctl32
ImageList_ReplaceIcon
ImageList_Create
ord17
ImageList_Destroy
comdlg32
GetSaveFileNameW
shell32
ShellExecuteW
ole32
CoInitializeSecurity
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE