Behavioral task
behavioral1
Sample
6207195f8ee5891aa0921f488a4c21a8d5aeb2357f757e46d3aab281326f6dd3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6207195f8ee5891aa0921f488a4c21a8d5aeb2357f757e46d3aab281326f6dd3.exe
Resource
win10v2004-20220812-en
General
-
Target
6207195f8ee5891aa0921f488a4c21a8d5aeb2357f757e46d3aab281326f6dd3
-
Size
152KB
-
MD5
5cdfb11f6d1d071707510fb24fb8de1b
-
SHA1
2477be22df945c1f684fa4e0168b616048f5f22f
-
SHA256
6207195f8ee5891aa0921f488a4c21a8d5aeb2357f757e46d3aab281326f6dd3
-
SHA512
072dd37f2eaf75c43f5f6f7c155557ab89737d2d86215894f83c81055860cb7f2641d2711fae03ee49efbdcd88bf2ccd3271c57678cba76cff545af033caef30
-
SSDEEP
3072:8/Hj0aO3s+/tc75fayDE9YrRe5ytDOL7Vj/E35+Qs/86W:YOK5f8Y9eJBYJ28T
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6207195f8ee5891aa0921f488a4c21a8d5aeb2357f757e46d3aab281326f6dd3.exe windows x86
e70e4a01c4aeb13ca647ec4caa66fa41
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathAppendW
PathRemoveFileSpecW
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
GetProcAddress
LoadLibraryW
SetDllDirectoryW
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
GetTickCount
msvcr80
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__setusermatherr
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
__set_app_type
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE