Behavioral task
behavioral1
Sample
c7f3e6375581ff764643b384506c78f48963409479c5b693f070ceedd031964f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7f3e6375581ff764643b384506c78f48963409479c5b693f070ceedd031964f.exe
Resource
win10v2004-20221111-en
General
-
Target
c7f3e6375581ff764643b384506c78f48963409479c5b693f070ceedd031964f
-
Size
792KB
-
MD5
a8c1c75c0c3c749d220574ba776be396
-
SHA1
b31727cc5142e4e810c010191940440590b2db12
-
SHA256
c7f3e6375581ff764643b384506c78f48963409479c5b693f070ceedd031964f
-
SHA512
56f35f49c0bc38fbea0c5a6a2aeb8e6c7208814c4b4ace27c9566314aa725d02a74904796b506e8c77c9d0b3bbeee69846ddff9f3d4163f42fc6413f907075fb
-
SSDEEP
3072:vP71F2IskxRGGgnMSc7OaKAP17mFv3QKtBcQnf0o1p5b:vz1F2IskxYXc7xKbvgKRs4b
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c7f3e6375581ff764643b384506c78f48963409479c5b693f070ceedd031964f.exe windows x86
0989e9d7fc5bc214a22619333866a852
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
CloseHandle
WriteFile
CreateFileA
LocalAlloc
GetLocalTime
ReadFile
GetFileSize
lstrlenA
lstrcmpA
lstrcpyA
lstrcatA
GetDateFormatA
GetSystemTime
GetWindowsDirectoryA
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
CreateProcessA
GetSystemDirectoryA
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
CopyFileA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetStartupInfoA
CompareStringA
GetTickCount
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
gdi32
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetStretchBltMode
StretchBlt
DeleteDC
mfc42
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
memcmp
strncmp
fprintf
_CxxThrowException
strstr
malloc
strlen
free
exit
fread
fwrite
fseek
time
sprintf
fopen
fscanf
atoi
strcmp
fclose
_mbscmp
srand
memset
rand
strncpy
_setmbcp
__CxxFrameHandler
ole32
CoUninitialize
CoInitialize
oleaut32
urlmon
URLDownloadToFileA
user32
SendMessageA
FindWindowExA
EnumWindows
GetAsyncKeyState
PostMessageA
SendMessageTimeoutA
RegisterWindowMessageA
GetForegroundWindow
ShowWindow
DispatchMessageA
TranslateMessage
PeekMessageA
GetClassNameA
EnableWindow
GetSystemMetrics
GetDC
ReleaseDC
EnumChildWindows
GetWindowTextA
wininet
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
InternetReadFile
HttpQueryInfoA
InternetGetConnectedState
InternetOpenA
InternetConnectA
HttpAddRequestHeadersA
HttpOpenRequestA
wsock32
WSAStartup
WSACleanup
Sections
UPX0 Size: 784KB - Virtual size: 784KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE