Behavioral task
behavioral1
Sample
c14addb4469efae3c882ec5065336d865c81af588c39fb2da956b40b5b79d1fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c14addb4469efae3c882ec5065336d865c81af588c39fb2da956b40b5b79d1fb.exe
Resource
win10v2004-20220812-en
General
-
Target
c14addb4469efae3c882ec5065336d865c81af588c39fb2da956b40b5b79d1fb
-
Size
56KB
-
MD5
076b66a3e35f84ce4aa309ceac59c9d8
-
SHA1
d96e1b34a25df63678d1972107cf715046644fb9
-
SHA256
c14addb4469efae3c882ec5065336d865c81af588c39fb2da956b40b5b79d1fb
-
SHA512
42550f4670961f30a644c00903ea2fe07c7b0d3cb2da157aa49c2f41f5e3106b618db9be9186e896b012f61827cbebbc77dd3a4a9c03b5cd2aa23cd792408336
-
SSDEEP
768:gzw8x5Eko/g6yGWv2kHqiiFH3o5wws1Kg7ScmdNyfIL:r/gwWv2kKHF45MeF
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c14addb4469efae3c882ec5065336d865c81af588c39fb2da956b40b5b79d1fb.exe windows x86
f96daf029a4514cb9e3a8f9e67a6381f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
CreateFileA
GetVolumeInformationA
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
LoadLibraryA
GetVersionExA
SetFileAttributesA
GetWindowsDirectoryA
DeleteFileA
GetTempPathA
MultiByteToWideChar
lstrlenA
WriteFile
WaitForSingleObject
ReadFile
CreateEventA
lstrcmpiA
WideCharToMultiByte
lstrlenW
GetTickCount
lstrcmpA
GetModuleFileNameA
ExpandEnvironmentStringsA
CreateProcessA
GetModuleFileNameW
FreeLibrary
GetLastError
CreateMutexA
WinExec
GetStartupInfoA
GetModuleHandleA
CloseHandle
FindFirstFileA
FindNextFileA
ResetEvent
FindClose
advapi32
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
msvcp60
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcrt
memcpy
_strdup
_strupr
_stricmp
_strlwr
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_except_handler3
_beginthread
wcsstr
strncmp
fseek
ftell
fread
fwrite
swprintf
rand
fputs
sprintf
memset
strncat
strncpy
strlen
strcpy
free
strstr
malloc
__CxxFrameHandler
exit
fopen
strcat
_wcsupr
atoi
strchr
fclose
??2@YAPAXI@Z
fgets
time
fprintf
strcmp
wcslen
strtok
ole32
CoInitialize
CoCreateInstance
CLSIDFromProgID
oleaut32
shlwapi
SHDeleteKeyA
PathFileExistsA
StrPBrkA
StrStrA
user32
CharToOemA
GetForegroundWindow
SetForegroundWindow
ws2_32
Sections
UPX0 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE