Behavioral task
behavioral1
Sample
b8f308aa9bf49dee9fe2968b0a2d6e76349b3e614f17176d3c990524c2e3e9f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8f308aa9bf49dee9fe2968b0a2d6e76349b3e614f17176d3c990524c2e3e9f8.exe
Resource
win10v2004-20220812-en
General
-
Target
b8f308aa9bf49dee9fe2968b0a2d6e76349b3e614f17176d3c990524c2e3e9f8
-
Size
159KB
-
MD5
5761564273e7b8ac13515600e1ef342a
-
SHA1
4400d840c206a8bfb04aecde2e74e31c418d4a84
-
SHA256
b8f308aa9bf49dee9fe2968b0a2d6e76349b3e614f17176d3c990524c2e3e9f8
-
SHA512
32aa26f6d3c505d3aa32c738b5f86a2097418074ae095be52efd3b3b8f0f3017715b604766a1f0217423b0bd7a1eae111987da931baca57212eb4e7c36dce3dc
-
SSDEEP
3072:qMSsQNxJUJTxvK27QQETiZsdw9J7JBiGoWMh395FQ:DQOgiCk7uTQ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b8f308aa9bf49dee9fe2968b0a2d6e76349b3e614f17176d3c990524c2e3e9f8.exe windows x86
b4e0151a222ad217806d8344bc933b60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerInstallFileA
kernel32
CloseHandle
Sleep
lstrlenW
DeleteFileA
GetAtomNameA
RemoveDirectoryA
SetEvent
OpenEventA
AddAtomA
HeapDestroy
GetModuleHandleA
GetStartupInfoA
HeapCreate
ExitProcess
GetCommandLineA
HeapAlloc
CompareStringA
HeapFree
LockResource
LoadResource
CompareStringW
GetVersionExA
SetErrorMode
LocalFree
FormatMessageA
InterlockedDecrement
CreateProcessA
CreateFileA
CopyFileA
GetTempFileNameA
GetTempPathA
WaitForSingleObject
SetFileAttributesA
ReadFile
GetShortPathNameA
GetPrivateProfileStringA
GetFileAttributesA
CreateDirectoryA
GlobalLock
GlobalAlloc
MultiByteToWideChar
GetModuleFileNameA
RtlUnwind
WideCharToMultiByte
lstrlenA
GlobalUnlock
GlobalFree
GetLastError
SetLastError
lstrcpyA
lstrcatA
GetUserDefaultLangID
GetPrivateProfileIntA
FindResourceA
FindResourceExA
GetWindowsDirectoryA
user32
TranslateMessage
PeekMessageA
GetWindowLongA
EndDialog
GetDlgItem
SendMessageA
SetWindowLongA
DispatchMessageA
IsDialogMessageA
CreateDialogIndirectParamA
SetDlgItemTextA
GetDesktopWindow
GetClientRect
GetWindowRect
MoveWindow
CharNextA
CharUpperA
CharLowerA
ReleaseDC
LoadImageA
GetDC
EndPaint
CreateDialogParamA
BeginPaint
DialogBoxIndirectParamA
MessageBoxA
DestroyWindow
wsprintfA
gdi32
DeleteDC
SelectObject
RealizePalette
SelectPalette
UnrealizeObject
CreateCompatibleDC
GetObjectA
GetDeviceCaps
CreateHalftonePalette
CreatePalette
GetSystemPaletteEntries
GetDIBColorTable
BitBlt
advapi32
RegCreateKeyA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
ole32
CoCreateInstance
CoFreeAllLibraries
CoInitialize
CoUninitialize
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
SafeArrayGetLBound
VariantClear
SafeArrayGetElement
SysAllocString
SafeArrayGetUBound
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE