Behavioral task
behavioral1
Sample
e2f5f34e6acd9e3d0807819da7116dfb2befe0466395ce583c905ad6f2ee95ef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e2f5f34e6acd9e3d0807819da7116dfb2befe0466395ce583c905ad6f2ee95ef.exe
Resource
win10v2004-20220901-en
General
-
Target
e2f5f34e6acd9e3d0807819da7116dfb2befe0466395ce583c905ad6f2ee95ef
-
Size
28KB
-
MD5
95e83355293d4c803589e7dfdd838e5f
-
SHA1
ba8e4a8bdeecfad81c132748c439fddb2ecdcf78
-
SHA256
e2f5f34e6acd9e3d0807819da7116dfb2befe0466395ce583c905ad6f2ee95ef
-
SHA512
3989b8ee0dc04737cfed5f0bfeab611a1e0a77106690c4c48251a2ef6cbd7c37ac70b48f08b1e32d3455db9add18f5d2ddc585e3ee08306bc9f546cc18947fe4
-
SSDEEP
384:zrt7gYN2CV0KpLVo+cHf9vqTosFKtMBDwsuGTuIm:zrxJvFLq39vqTosY80bGTH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e2f5f34e6acd9e3d0807819da7116dfb2befe0466395ce583c905ad6f2ee95ef.exe windows x86
5b79fb7a74591d42e592b3cd3205873c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
CloseHandle
GetModuleFileNameA
OpenEventA
GetTickCount
GetModuleHandleA
ResetEvent
WaitForMultipleObjects
ExitThread
GetProcAddress
FreeLibrary
GetCurrentThreadId
lstrlenA
MultiByteToWideChar
Sleep
RtlUnwind
CreateThread
ExitProcess
LoadLibraryA
CreateEventA
advapi32
RegCreateKeyExA
RegCreateKeyA
RegSetValueExW
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegNotifyChangeKeyValue
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
user32
wsprintfA
ShowWindow
DestroyWindow
PeekMessageA
TranslateMessage
DispatchMessageA
CreateDesktopA
wsprintfW
MsgWaitForMultipleObjects
CreateWindowExA
SetThreadDesktop
wininet
InternetGetConnectedState
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE