Behavioral task
behavioral1
Sample
23c45940532b9d9c3920842814f5c548196c742ea866ee3fb9dfce7cf80b3be3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
23c45940532b9d9c3920842814f5c548196c742ea866ee3fb9dfce7cf80b3be3.exe
Resource
win10v2004-20220812-en
General
-
Target
23c45940532b9d9c3920842814f5c548196c742ea866ee3fb9dfce7cf80b3be3
-
Size
8.7MB
-
MD5
36e6e38c156fdd12dc5490629fbe1927
-
SHA1
acfad0aa6eff22f67749518403ec9c4a7c158147
-
SHA256
23c45940532b9d9c3920842814f5c548196c742ea866ee3fb9dfce7cf80b3be3
-
SHA512
e513178cc0a7b69cd518395acd97e30dcf9569acdf96973d495700ea856ef9c692d02990e8cf9d33638c14eb3b1c9fdaf4032246b9bb4cd35924b0b570bc7884
-
SSDEEP
196608:ras6Qr9UxKcKuC1iVVK4BJdRj5IfOgWMKGsbUf2gTAtRY5:brMKZuC1iVfBJqfOgWMDf2Wv
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
23c45940532b9d9c3920842814f5c548196c742ea866ee3fb9dfce7cf80b3be3.exe windows x64
0942261d033d50acba023e655699eb9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleHandleW
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SendMessageW
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
gdi32
DeleteDC
advapi32
SetFileSecurityA
shell32
SHGetKnownFolderPath
ole32
GetHGlobalFromStream
iphlpapi
GetAdaptersAddresses
shlwapi
SHDeleteKeyW
dbghelp
ImageDirectoryEntryToData
ntdll
RtlVirtualUnwind
ws2_32
WSAGetLastError
gdiplus
GdipCreateBitmapFromScan0
wtsapi32
WTSSendMessageW
Sections
.text Size: 493KB - Virtual size: 493KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 4.7MB - Virtual size: 4.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 955B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ