Behavioral task
behavioral1
Sample
c21adbf7c44ce7dac95ad25b3ce610031b24114764be70bfdd6fe7c759133ece.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c21adbf7c44ce7dac95ad25b3ce610031b24114764be70bfdd6fe7c759133ece.exe
Resource
win10v2004-20221111-en
General
-
Target
c21adbf7c44ce7dac95ad25b3ce610031b24114764be70bfdd6fe7c759133ece
-
Size
14KB
-
MD5
0a5bec07760f9bc87afd5bb0476b6440
-
SHA1
e4f262061776e78a31945f86705342521d72cc8d
-
SHA256
c21adbf7c44ce7dac95ad25b3ce610031b24114764be70bfdd6fe7c759133ece
-
SHA512
af9a7836e47dd0c9cd2e61861eca94e43e47170730d9cb71ebf0f80d8462321e8df0a328d53f724e39471a4a6ee6a9e128aed922f5d96f8211b0bfc8b7f8db50
-
SSDEEP
96:iadlfOpyg9IHUNZJDD5silHClzln1izcTUfyPzkwa1B4VcE4QfwPo+y:niyVHUNP5xHWdsIsyPzrwCcE4QY7y
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c21adbf7c44ce7dac95ad25b3ce610031b24114764be70bfdd6fe7c759133ece.exe windows x86
27bcacad97b2170d56ad1f85ca54587b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
DeleteFileA
WaitForSingleObject
SetEvent
OpenEventA
CreateEventA
CloseHandle
CreateProcessA
OpenProcess
CreateFileA
CopyFileA
GetTempFileNameA
GetTempPathA
GetModuleFileNameA
GetCommandLineA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetSystemDirectoryA
GetCurrentProcessId
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
msvcrt
_mbsstr
_itoa
_mbsnbcpy
_mbsnbcat
??3@YAXPAX@Z
_mbscmp
exit
_close
_write
_open
??2@YAPAXI@Z
_mbschr
atoi
strlen
memset
sprintf
strcat
__CxxFrameHandler
strcpy
memcmp
_read
_lseeki64
shell32
ShellExecuteA
user32
WaitForInputIdle
wininet
InternetReadFile
InternetOpenUrlA
InternetCanonicalizeUrlA
InternetOpenA
InternetCloseHandle
Sections
UPX0 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE