Behavioral task
behavioral1
Sample
cb79af3cf18f8a7a18dfc84e5c1c70089aaaec8d844311067ac35164c129e26f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cb79af3cf18f8a7a18dfc84e5c1c70089aaaec8d844311067ac35164c129e26f.exe
Resource
win10v2004-20221111-en
General
-
Target
cb79af3cf18f8a7a18dfc84e5c1c70089aaaec8d844311067ac35164c129e26f
-
Size
312KB
-
MD5
26ed4c01ad45a87ef3c7f7261de47af6
-
SHA1
b546dcdc93f3ab1f9670e2226913ab76eb36e9a5
-
SHA256
cb79af3cf18f8a7a18dfc84e5c1c70089aaaec8d844311067ac35164c129e26f
-
SHA512
c9f5766752f0bd3a9ba80f787039b4315ece90868d43df589fdda3ca0624b90b920a308dcf588c55c84f6148e9c086a58962ce566928502769589388dc6a27d2
-
SSDEEP
6144:LTPVwffHq1KZe75QAQbpkirLauxyxPS5djYQ/MVCCk+mfPbIDIfWF7eOpmt/e9A/:LTPegrDIfW0OpgdxooEhq
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cb79af3cf18f8a7a18dfc84e5c1c70089aaaec8d844311067ac35164c129e26f.exe windows x86
7d09da2526633196cc6c35fa08fdaa79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetShortPathNameA
MoveFileExA
LocalAlloc
GetCurrentThread
FreeLibrary
SetFilePointer
SetEnvironmentVariableA
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
TerminateProcess
OpenProcess
MultiByteToWideChar
DeviceIoControl
GetCurrentThreadId
SetEndOfFile
GetCurrentProcessId
CreateDirectoryA
GetFileAttributesA
RemoveDirectoryA
CopyFileA
Sleep
FindFirstFileA
SetLastError
FindNextFileA
FindClose
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
WinExec
OpenFile
_lclose
SetFileAttributesA
DeleteFileA
GetVersionExA
GetFullPathNameA
SetCurrentDirectoryA
GetLastError
FormatMessageA
LocalFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetWindowsDirectoryA
GetSystemDirectoryA
GetCurrentDirectoryA
GetUserDefaultLangID
GetModuleFileNameA
GetComputerNameA
GetPrivateProfileStringA
GetStartupInfoA
user32
EnumWindows
GetWindowThreadProcessId
DialogBoxParamA
LoadStringA
GetParent
CopyRect
OffsetRect
SetWindowPos
MessageBoxA
LoadBitmapA
UpdateWindow
ShowWindow
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
GetWindowRect
GetClientRect
SendMessageA
CreateWindowExA
GetDesktopWindow
LoadImageA
ExitWindowsEx
wsprintfA
GetWindowInfo
GetSystemMetrics
SetDlgItemTextA
GetDlgItem
EnableWindow
EndDialog
IsDlgButtonChecked
advapi32
IsValidSecurityDescriptor
RegSetValueExA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
GetUserNameA
RegDeleteKeyA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
FreeSid
RevertToSelf
AccessCheck
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
AllocateAndInitializeSid
OpenThreadToken
ImpersonateSelf
CloseServiceHandle
OpenServiceA
OpenSCManagerA
DeleteService
QueryServiceStatus
ControlService
RegQueryValueExA
RegEnumValueA
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
setupapi
SetupDiBuildDriverInfoList
SetupDiSetDeviceInstallParamsA
SetupDiGetDeviceInstanceIdA
SetupDiClassGuidsFromNameA
SetupDiGetINFClassA
SetupDiRegisterDeviceInfo
SetupDiSetDeviceRegistryPropertyA
SetupDiCreateDeviceInfoA
SetupDiCreateDeviceInfoList
SetupDiGetDeviceInstallParamsA
SetupDiGetDriverInfoDetailA
SetupDiDestroyDriverInfoList
SetupDiSetSelectedDevice
SetupDiCallClassInstaller
SetupDiRemoveDevice
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
SetupDiEnumDriverInfoA
comctl32
ord17
shlwapi
PathIsDirectoryA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
_mbstok
_itoa
_except_handler3
strstr
strchr
memmove
strtoul
_mbscmp
_mbsnbcmp
_mbsnbicmp
_strdup
free
__CxxFrameHandler
atoi
fopen
fclose
vsprintf
fgetc
_mbsnbcpy
sscanf
fprintf
_mbsstr
_mbsicmp
sprintf
exit
??2@YAPAXI@Z
getenv
_mbschr
_mbscspn
_mbsrchr
toupper
??3@YAXPAX@Z
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE