Behavioral task
behavioral1
Sample
948d15634a51784de104002a3572dab1710ed72872862b11c5dcfae91251f691.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
948d15634a51784de104002a3572dab1710ed72872862b11c5dcfae91251f691.exe
Resource
win10v2004-20220812-en
General
-
Target
948d15634a51784de104002a3572dab1710ed72872862b11c5dcfae91251f691
-
Size
164KB
-
MD5
32e1ea758bbd4ba9aa67a6014fbf6966
-
SHA1
7812673b97d0e70873564c0098f0ea65e89f6bb7
-
SHA256
948d15634a51784de104002a3572dab1710ed72872862b11c5dcfae91251f691
-
SHA512
6273b74cce6b4a60485dd0c9162a2333387327fb087cee15c38f43f6ed90b47f46654864640714094b32b4924e39d56a163a63031b80218e017bf4891a979aa5
-
SSDEEP
3072:ZL3gPqo/hKrsW51jgDryMf41g9RD+sm4Ozr67bu:ZLwysW512yMQqSyfu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
948d15634a51784de104002a3572dab1710ed72872862b11c5dcfae91251f691.exe windows x86
448f51eae75a63a63ed7ce69360b3f66
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
SetLastError
FormatMessageA
CloseHandle
GetLastError
HeapAlloc
GetProcessHeap
GetProcAddress
LoadLibraryA
HeapFree
TerminateProcess
DeleteFileA
SetFileAttributesA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
RemoveDirectoryA
lstrlenA
FreeLibrary
LocalAlloc
GetWindowsDirectoryA
GetVersionExA
MoveFileExA
GetSystemDirectoryA
ReadFile
SetEndOfFile
SetFilePointer
CreateFileA
GetStringTypeW
FlushFileBuffers
SetStdHandle
LocalFree
GetEnvironmentStringsW
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
advapi32
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiCallClassInstaller
SetupDiDestroyDeviceInfoList
rpcrt4
UuidToStringA
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE