Behavioral task
behavioral1
Sample
942fb0458f67b87a8a4230e0bb2bd0020aebbe34725f25deb48fc428b16f2e48.exe
Resource
win7-20220812-en
General
-
Target
942fb0458f67b87a8a4230e0bb2bd0020aebbe34725f25deb48fc428b16f2e48
-
Size
205KB
-
MD5
ada0d7555bd29b22c47ff15167290354
-
SHA1
68f891c28be9885f2e95e513a4c4686a2e7d2e2a
-
SHA256
942fb0458f67b87a8a4230e0bb2bd0020aebbe34725f25deb48fc428b16f2e48
-
SHA512
4cf4fcc3d6c79889274e44a9d50f13d1e031040bd4523977899be2061a2abf530d6a13dfc5d39071cabfa18cbcfb10da405f7cf73b9b9ebda7aadc0a105d8cc4
-
SSDEEP
3072:vCIClhcQ8AMOOPrbL/9fOrOYe+tJFNhvmbPSNWE1S/T84hezXaT:qlAQjMOOPDBOr9ey9mbPSNWE1SI4C
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
942fb0458f67b87a8a4230e0bb2bd0020aebbe34725f25deb48fc428b16f2e48.exe windows x86
6bfc23e8cd029e392841082a6a41d0de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegQueryValueExW
kernel32
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
WaitForSingleObject
GetLastError
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetModuleFileNameW
Sleep
CreateThread
CreateEventW
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetEvent
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetCommandLineW
HeapSetInformation
LocalFree
LockResource
FindResourceExW
FormatMessageW
HeapFree
HeapAlloc
GetProcessHeap
ExpandEnvironmentStringsW
CompareStringW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
HeapSize
HeapReAlloc
HeapDestroy
IsDebuggerPresent
user32
PostThreadMessageW
TranslateMessage
CharUpperW
MessageBoxW
CharNextW
DispatchMessageW
GetMessageW
msvcr90
_purecall
_recalloc
??_U@YAPAXI@Z
memset
??2@YAPAXI@Z
memmove_s
_amsg_exit
wcscat_s
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
??3@YAXPAX@Z
??_V@YAXPAX@Z
wcsstr
malloc
__wgetmainargs
free
memcpy_s
wcscpy_s
wcsncpy_s
shell32
ShellExecuteW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoInitialize
oleaut32
SysAllocString
VarUI4FromStr
RegisterTypeLi
SysFreeString
SysStringLen
LoadTypeLi
UnRegisterTypeLi
setupapi
SetupDiCreateDeviceInfoList
SetupDiOpenDeviceInterfaceW
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailW
SetupDiGetDeviceInterfaceAlias
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE