Behavioral task
behavioral1
Sample
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe
Resource
win10v2004-20220812-en
General
-
Target
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571
-
Size
206KB
-
MD5
ecce578d57f3ef52ede4dceed905b14a
-
SHA1
21cb1eec7a55a6de3ea49ce6f672bcfc059ad564
-
SHA256
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571
-
SHA512
69d28ece2017d958254034bf0fb956a94ebb2ffded11e457e422a6a6ff494fcc3bbce47d2c55ae8ce77730cfa963cb27c645ac3de25efc28a0b4b910c824cb6e
-
SSDEEP
6144:ugqqULirVT01d6a5vR36hMmOii1i2DpFJF1:u0rVwv6a5vRMMmOii1i2FFJ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c72a6d3ec09ee2f49c92b921e5a28e71c1153d92c1657ef3448f8d60c19cb571.exe windows x86
bcab579dc6062171842d415a5071d9bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
kernel32
GetLastError
lstrlenW
CompareStringA
ExitProcess
FreeLibrary
SetErrorMode
GetProcAddress
HeapFree
SetCurrentDirectoryW
ExpandEnvironmentStringsW
HeapAlloc
CreateMutexW
GetStartupInfoW
GetProcessHeap
SetThreadPriority
GetCurrentThread
LocalFree
LoadLibraryW
FormatMessageW
GetCommandLineW
GetModuleHandleW
CloseHandle
SetEvent
OpenEventW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LoadLibraryA
InterlockedExchange
LocalAlloc
RaiseException
user32
SetForegroundWindow
GetClassNameA
GetParent
GetDesktopWindow
GetWindowThreadProcessId
IsWindowVisible
GetWindow
MessageBoxW
GetSystemMetrics
ShowWindow
FindWindowW
SendMessageTimeoutW
IsIconic
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE