Behavioral task
behavioral1
Sample
1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe
Resource
win7-20220414-en
General
-
Target
1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc
-
Size
117KB
-
MD5
ada4085a5d32e6a930ef5a30f798e58d
-
SHA1
f36563de3e43af2d3fcaf706e4bc2f9b177eaa79
-
SHA256
1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc
-
SHA512
91ca02156a111de3d23c3dc23a1682b3066dbd21b075b64f74426a3bd279bf89dd719cbac8f1730a43b8b534ca6811b3d6cd054b5fd163a215da529b4ac6371d
-
SSDEEP
3072:h9mQrWSB/WM+dCB+IF1G6sT11I0EiAUQ+iU2r2Z:h9USBOMNBNF1cxy0EiAUQ+iU2r2Z
Malware Config
Extracted
gootkit
1234
zalipon.wollega.com
trussardi.qunamti.com
luga5lindalupina.com
-
vendor_id
1234
Signatures
-
Gootkit family
Files
-
1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe windows x86
cec901dd4cece3a5835f751a49aba900
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCpyW
StrCmpIW
StrCpyNW
StrCmpW
StrStrIW
StrRChrW
StrDupW
PathMatchSpecW
StrStrA
StrCatW
PathFindFileNameW
psapi
GetProcessImageFileNameA
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetProfilesDirectoryW
ws2_32
WSAStartup
socket
inet_addr
closesocket
gethostbyname
bind
ntohs
winhttp
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpSetOption
WinHttpOpenRequest
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpCloseHandle
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpReadData
kernel32
GetFileAttributesW
lstrcmpW
VirtualProtect
GetExitCodeProcess
FindClose
MapViewOfFile
CreateFileMappingW
OpenMutexW
CreateMutexW
SetErrorMode
GetCommandLineW
GetModuleHandleExA
GetModuleFileNameA
GetFileTime
GetSystemTime
SystemTimeToFileTime
GetFileSize
DeleteFileW
LocalAlloc
SetEndOfFile
SetFileTime
RemoveDirectoryW
WriteFile
CreateEventA
GlobalMemoryStatusEx
SetEnvironmentVariableA
GetSystemInfo
TerminateThread
GetSystemDirectoryW
GetEnvironmentVariableA
HeapFree
GetCurrentProcess
lstrlenW
lstrlenA
GetModuleHandleA
GetVersion
GetLastError
CloseHandle
HeapAlloc
GetProcAddress
GetComputerNameW
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
WideCharToMultiByte
lstrcpyW
GetTickCount
GetComputerNameA
lstrcmpA
Sleep
LoadLibraryA
WriteProcessMemory
SetLastError
ExpandEnvironmentStringsW
TerminateProcess
WaitForSingleObject
ResumeThread
GetExitCodeThread
lstrcatW
GetThreadContext
ReadProcessMemory
CreateProcessW
CreateRemoteThread
IsBadReadPtr
GetShortPathNameW
CreateFileW
VirtualFree
VirtualAlloc
lstrcpyA
HeapReAlloc
GlobalFree
GlobalAlloc
LocalFree
OpenProcess
MultiByteToWideChar
GetLogicalDrives
WaitForMultipleObjects
DeleteAtom
GetCurrentThreadId
IsSystemResumeAutomatic
ExitThread
GetCommandLineA
ProcessIdToSessionId
CreateThread
FindAtomW
FindNextFileW
ReadFile
GetModuleFileNameW
SetFilePointer
lstrcmpiA
ExitProcess
SetEvent
FindFirstFileW
SetEnvironmentVariableW
user32
CreatePopupMenu
ExitWindowsEx
GetCapture
ReleaseCapture
GetClipboardOwner
wsprintfA
GetActiveWindow
CountClipboardFormats
GetProcessWindowStation
GetMessagePos
GetDesktopWindow
wsprintfW
GetClipboardViewer
GetInputState
GetShellWindow
CreateMenu
GetCaretBlinkTime
GetClipboardSequenceNumber
DestroyCaret
GetForegroundWindow
GetKBCodePage
GetDoubleClickTime
CloseClipboard
GetMenuCheckMarkDimensions
GetCursor
GetOpenClipboardWindow
GetFocus
GetMessageExtraInfo
GetMessageTime
GetDialogBaseUnits
advapi32
LookupPrivilegeValueA
RegOpenKeyExA
CheckTokenMembership
FreeSid
OpenProcessToken
SetSecurityDescriptorDacl
SetFileSecurityW
SetEntriesInAclW
InitializeSecurityDescriptor
GetUserNameW
RegOpenKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegOpenKeyA
SetTokenInformation
CreateProcessAsUserW
GetLengthSid
DuplicateTokenEx
LookupAccountSidW
AdjustTokenPrivileges
RevertToSelf
GetTokenInformation
ConvertSidToStringSidW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyA
GetUserNameA
RegCloseKey
RegQueryValueExA
GetSidSubAuthorityCount
AllocateAndInitializeSid
GetSidSubAuthority
CreateWellKnownSid
RegSetValueExA
ole32
CoCreateInstance
CoInitialize
CoInitializeEx
CoUninitialize
CoTaskMemFree
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ