Behavioral task
behavioral1
Sample
e29d59bf2856077921e2a815ffb72d6ec552a4fca8ca93c4485c007e7dc298cc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e29d59bf2856077921e2a815ffb72d6ec552a4fca8ca93c4485c007e7dc298cc.exe
Resource
win10v2004-20221111-en
General
-
Target
e29d59bf2856077921e2a815ffb72d6ec552a4fca8ca93c4485c007e7dc298cc
-
Size
282KB
-
MD5
2ad8ea87c13e95b5bffac8fcd262e82e
-
SHA1
0537544ddcb8c6461d9eaeb59ff26c5b5ff2016c
-
SHA256
e29d59bf2856077921e2a815ffb72d6ec552a4fca8ca93c4485c007e7dc298cc
-
SHA512
c3c7558ac86eb39f5ff69e78e37761e7b40dea2b9b1e7eb9fea3f020493c815bfa20ee1c117ad140f6c1be5058b565ee9c5f4aafa053145f384b45ab5645911c
-
SSDEEP
6144:pwMOuR1+BEa2IskUHkXenoPsNR238WiKQLAcV/1xBm0tOPzu2F3v7bTz25YrfOn0:2DuRk+Wd7Z
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e29d59bf2856077921e2a815ffb72d6ec552a4fca8ca93c4485c007e7dc298cc.exe windows x86
daf5ef18e785421f0c6d5e3a23a3591b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetWindowsDirectoryA
lstrcatA
SetFileAttributesA
GetFileTime
SetFileTime
GetModuleFileNameA
GetTempPathA
CreateFileA
CloseHandle
GetStartupInfoA
CreateProcessA
ExitProcess
lstrlenA
WriteFile
dnsapi
DnsFlushResolverCache
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
sprintf
memset
strlen
_controlfp
Sections
UPX0 Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE