Behavioral task
behavioral1
Sample
a6d0a830f7757a3775070b19edcf9cb44497a6bfb03f1f684fa7a13e1fa8c247.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a6d0a830f7757a3775070b19edcf9cb44497a6bfb03f1f684fa7a13e1fa8c247.exe
Resource
win10v2004-20220812-en
General
-
Target
a6d0a830f7757a3775070b19edcf9cb44497a6bfb03f1f684fa7a13e1fa8c247
-
Size
76KB
-
MD5
2e434fd060156dd329d9b3ea0ffdb6a3
-
SHA1
1aab7666ced8a9ae41580aed77576263402e352c
-
SHA256
a6d0a830f7757a3775070b19edcf9cb44497a6bfb03f1f684fa7a13e1fa8c247
-
SHA512
9c523f8a9afba04ce17e57ff0c04fbdd1d50f211871eaae4e824ffa22c2e3432751794bd15041aa7b5cad2b304ff9478548aefd3e7c01f5ef09b379566ae959a
-
SSDEEP
768:NC38C8jChgIC9eLM8JjlVmbpNqRW+U2J89GgdhP6ilYx2K:NCh8gw9eLnjlVmLDTGUUibK
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a6d0a830f7757a3775070b19edcf9cb44497a6bfb03f1f684fa7a13e1fa8c247.exe windows x86
b1ab39d8236bd4f93813296c6ee02223
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrlenA
lstrcmpiA
WritePrivateProfileStringA
WriteFile
SizeofResource
SetFilePointer
SetEndOfFile
ReadFile
MoveFileExA
LockResource
LoadResource
LoadLibraryExA
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
GetProcAddress
GetFileSize
FreeResource
FreeLibrary
FindResourceA
DeleteFileA
CreateProcessA
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
gdi32
TextOutW
shlwapi
PathFileExistsA
user32
GetKeyboardType
MessageBoxA
CharNextA
IsCharAlphaA
GetMessageA
FindWindowA
DispatchMessageA
CreateWindowExA
Sections
UPX0 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE