Behavioral task
behavioral1
Sample
dd957e57bc18aa5b518bf2b71aa3bb3b57beec32fcff087fcb039d1b55f930f7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd957e57bc18aa5b518bf2b71aa3bb3b57beec32fcff087fcb039d1b55f930f7.exe
Resource
win10v2004-20220812-en
General
-
Target
dd957e57bc18aa5b518bf2b71aa3bb3b57beec32fcff087fcb039d1b55f930f7
-
Size
420KB
-
MD5
37d3818c0dc54ee67bf818b4955d97f7
-
SHA1
552f3450bf25f9be9a3e79b4fba576388f319514
-
SHA256
dd957e57bc18aa5b518bf2b71aa3bb3b57beec32fcff087fcb039d1b55f930f7
-
SHA512
9a389ba9351d7d30f826711469abb3b18c8ba051f19b53f02e3b6e23712d25ea40d925dcd5f2e0a05dd19734a8d3d67b50f77e889a0397a99a81c1cda134c5a9
-
SSDEEP
6144:rcpdDA93CtkqbnrZq5URjtGKyaY6NEaYAarAbmnBREAh0nq411QEiyx8m:rz4kqbnrZ6jiY3qmREAhMq411Qha8
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dd957e57bc18aa5b518bf2b71aa3bb3b57beec32fcff087fcb039d1b55f930f7.exe windows x86
1522be4679198caee8afd98960649073
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
Sleep
GetCurrentThreadId
ExitProcess
lstrlenA
LoadLibraryA
SetEnvironmentVariableA
SetEndOfFile
GetOEMCP
GetACP
SetStdHandle
IsBadCodePtr
MapViewOfFile
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetStdHandle
SetHandleCount
ReadFile
CloseHandle
UnmapViewOfFile
IsBadWritePtr
VirtualAlloc
GetLastError
CreateFileA
GetModuleHandleA
GetProcAddress
GetStringTypeW
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetCurrentProcess
GetComputerNameA
TerminateProcess
OpenProcess
GetLocalTime
IsBadReadPtr
GetCurrentProcessId
WideCharToMultiByte
GlobalFree
GlobalAlloc
MultiByteToWideChar
SetLastError
WriteFile
SetFilePointer
GetFileSize
DeleteFileA
EnterCriticalSection
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
MoveFileA
GetStartupInfoA
GetCommandLineA
GetVersion
GetSystemTimeAsFileTime
GetFileAttributesA
HeapReAlloc
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
HeapSize
TlsSetValue
TlsAlloc
TlsGetValue
SetUnhandledExceptionFilter
GetModuleFileNameA
GetEnvironmentVariableA
lstrcpyA
LoadLibraryA
VirtualAlloc
GetModuleFileNameA
ExitProcess
user32
LoadIconA
SetClassLongA
SetTimer
EndDialog
GetSystemMenu
DeleteMenu
EnableWindow
GetDlgItem
ShowWindow
KillTimer
IsWindowVisible
DialogBoxParamA
MessageBoxA
SetWindowTextA
MoveWindow
SetWindowLongA
GetWindowLongA
GetSystemMetrics
GetWindowRect
SetWindowPos
FindWindowA
GetWindowThreadProcessId
SetFocus
GetClientRect
CreateDialogParamA
ClientToScreen
SetDlgItemTextA
MessageBoxA
gdi32
CreateSolidBrush
comdlg32
GetOpenFileNameA
advapi32
RegSetValueExA
RegOpenKeyExA
comctl32
ord17
psapi
GetModuleFileNameExA
ole32
OleSetContainedObject
OleCreate
OleInitialize
OleUninitialize
oleaut32
VariantInit
SysAllocString
VariantClear
Sections
.text Size: - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 404KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ