Behavioral task
behavioral1
Sample
a01f958303908593960700e185621339.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
a01f958303908593960700e185621339.exe
Resource
win10v2004-20220721-en
General
-
Target
a01f958303908593960700e185621339.exe
-
Size
592KB
-
MD5
a01f958303908593960700e185621339
-
SHA1
f2d77bd0ac2fc032606c36d908d46613e29ba5d3
-
SHA256
99f632633f17babbae3446273033516839f84253e28b18f6afda1bd4e5713c2c
-
SHA512
d294564d72f7d747c5880c045115f493b2143ec2948004b343c6c10d1ef74d5ab1e39bb73d13fd18732299cb1a577012bee030c223993ec7784c0e0d9bfef285
-
SSDEEP
12288:16muaDA5tBeLyenq/tZp0pVlmZ6spuIqH:ZvA53dE+3qpCns
Malware Config
Extracted
netwire
logbox147.duckdns.org:3370
-
activex_autorun
true
-
activex_key
{F43NBRHB-ST27-05SC-62QP-X844OXS2E107}
-
copy_executable
true
-
delete_original
false
-
host_id
MONEY
-
install_path
%AppData%\Install\skyp.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
iiXJiIYR
-
offline_keylogger
true
-
password
forgood
-
registry_autorun
true
-
startup_name
skyp
-
use_mutex
true
Signatures
Files
-
a01f958303908593960700e185621339.exe.exe windows x86
78524a324633c13020b2f0da88b89153
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
_strdup
_stricoll
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_beginthreadex
_cexit
_errno
_filelengthi64
_fmode
_fpreset
_fullpath
_iob
_isctype
_onexit
_pctype
_setmode
_vscprintf
_vsnprintf
abort
atexit
atoi
calloc
fclose
fflush
fgetpos
fgets
fopen
fputc
fread
free
fsetpos
fwrite
getenv
localeconv
malloc
mbstowcs
memcpy
realloc
setlocale
signal
sprintf
strcat
strchr
strcmp
strcoll
strcpy
strlen
tolower
vfprintf
wcslen
wcstombs
advapi32
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptReleaseContext
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crypt32
CryptUnprotectData
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
GetDIBits
SelectObject
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
CreateMutexA
CreatePipe
CreateProcessA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
GetFileAttributesExA
GetLastError
GetLocalTime
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessTimes
GetStartupInfoA
GetSystemInfo
GetSystemTime
GetTickCount
GetVersionExA
GetVolumeInformationA
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LocalFree
MoveFileA
MultiByteToWideChar
OpenProcess
PeekNamedPipe
Process32First
Process32Next
ReadFile
ReleaseMutex
ResumeThread
SetErrorMode
SetFileAttributesA
SetFilePointer
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
VirtualAlloc
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcmpA
lstrcmpiW
lstrlenA
netapi32
NetApiBufferFree
NetWkstaGetInfo
shell32
SHFileOperationA
ShellExecuteA
user32
CreateWindowExA
DefWindowProcA
DispatchMessageA
EnumWindows
GetDC
GetDesktopWindow
GetForegroundWindow
GetKeyNameTextA
GetKeyState
GetKeyboardState
GetLastInputInfo
GetMessageA
GetSystemMetrics
GetWindowTextA
IsWindowVisible
MapVirtualKeyA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetCursorPos
SetWindowTextA
ShowWindow
ToAscii
TranslateMessage
keybd_event
mouse_event
ws2_32
WSACleanup
WSAGetLastError
WSAIoctl
WSAStartup
__WSAFDIsSet
closesocket
connect
gethostbyname
gethostname
htons
inet_ntoa
ioctlsocket
ntohs
recv
select
send
setsockopt
shutdown
socket
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 4KB - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE