Behavioral task
behavioral1
Sample
c1988fdabf5e32125647c29dc6b8ccb73a72049025b29212849ce6ba0ca0f1a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1988fdabf5e32125647c29dc6b8ccb73a72049025b29212849ce6ba0ca0f1a3.exe
Resource
win10v2004-20220812-en
General
-
Target
c1988fdabf5e32125647c29dc6b8ccb73a72049025b29212849ce6ba0ca0f1a3
-
Size
248KB
-
MD5
20e834d8f7cbbda77cf49ae4ed0169bf
-
SHA1
9ca0be13171fa1be57fc133891a4768f376b949d
-
SHA256
c1988fdabf5e32125647c29dc6b8ccb73a72049025b29212849ce6ba0ca0f1a3
-
SHA512
89c52edb1b09fe79cb1e336f71addf8f6e75169d4184f77262e78b5f7f326f8a50086864982b2493d19beff802352bda363e4c7404fa47bec8800a456399aa3a
-
SSDEEP
6144:qONdH5eJWtX1KExSej6ie599++MP0CJWRWJrc+:qGd0JWtX1rj6t590+MP0VRWJ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c1988fdabf5e32125647c29dc6b8ccb73a72049025b29212849ce6ba0ca0f1a3.exe windows x86
8a2fb1ca3987f2e92d3d752875b6e919
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
IsBadCodePtr
InitializeCriticalSection
CreateFileA
InterlockedExchange
RtlUnwind
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
ReadFile
HeapReAlloc
LCMapStringW
lstrcmpA
LCMapStringA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
lstrcatA
SetFilePointer
lstrlenA
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
GetPrivateProfileStringA
lstrcpynA
LoadLibraryA
GetModuleFileNameA
GetSystemDirectoryA
GetTickCount
WinExec
CloseHandle
GetModuleHandleA
GetProcAddress
Sleep
CreateMutexA
GetLastError
GetCurrentProcess
HeapSize
ExitProcess
SetUnhandledExceptionFilter
DeleteCriticalSection
WriteFile
LeaveCriticalSection
FreeLibrary
MultiByteToWideChar
EnterCriticalSection
TlsGetValue
GetLocaleInfoA
GetACP
GetVersionExA
WideCharToMultiByte
RaiseException
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
GetSystemTimeAsFileTime
user32
WinHelpA
MessageBoxA
MapWindowPoints
EnumDisplaySettingsExA
ChangeDisplaySettingsExA
ReleaseDC
KillTimer
PtInRect
GetDlgCtrlID
wsprintfA
GetWindowTextA
EnumWindows
IsWindowVisible
GetWindow
FindWindowExA
LockWindowUpdate
GetClientRect
ShowWindow
EnumChildWindows
PostMessageA
GetClassNameA
GetParent
SetWindowLongA
GetSystemMetrics
FindWindowA
ExitWindowsEx
GetDC
EnumDisplaySettingsA
EnableWindow
BeginPaint
FillRect
EndPaint
DialogBoxParamA
SetTimer
GetDesktopWindow
GetWindowRect
EndDialog
GetDlgItem
SendMessageA
SetWindowPos
SetForegroundWindow
LoadIconA
SendDlgItemMessageA
LoadStringA
SetDlgItemTextA
GetWindowLongA
gdi32
GetStockObject
GetObjectA
CreateFontIndirectA
SelectObject
GetTextAlign
SetTextAlign
TextOutA
DeleteObject
CreateDCA
DeleteDC
ExtEscape
advapi32
LookupPrivilegeValueA
RegDeleteValueA
RegCreateKeyExA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceConfigA
ChangeServiceConfigA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
rpcrt4
UuidToStringA
RpcStringFreeA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
comctl32
PropertySheetA
Sections
.text Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE