Behavioral task
behavioral1
Sample
6dc824601a8ef8d7d9e21a3917b56485f5c090706bb519e4d59439afa56bace6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6dc824601a8ef8d7d9e21a3917b56485f5c090706bb519e4d59439afa56bace6.exe
Resource
win10v2004-20220812-en
General
-
Target
6dc824601a8ef8d7d9e21a3917b56485f5c090706bb519e4d59439afa56bace6
-
Size
269KB
-
MD5
8bfa00c7d4d6846f8952c38c367154d7
-
SHA1
a924b007415a6adf3e1e76b5927fc82b4fd17f23
-
SHA256
6dc824601a8ef8d7d9e21a3917b56485f5c090706bb519e4d59439afa56bace6
-
SHA512
e105f6f0f8af32bd7a35171d34afb9e63218d3f2d2f3b18bf66f2a58e27cc59bfe0a37aa9400e1bae6acdfc2b6d3a5294037fdfcf9aa7b9b12291d43f9bf1c11
-
SSDEEP
6144:lAWPlsmJsALXqo1jmUZxL6xQGQm9UmM7I+6cwMFn:lAWWmXLXqs76ve7I+L3n
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6dc824601a8ef8d7d9e21a3917b56485f5c090706bb519e4d59439afa56bace6.exe windows x86
9e1f294118dd4ed524e6c4c951348cf6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strstr
??2@YAPAXI@Z
strrchr
??3@YAXPAX@Z
srand
rand
memset
memcpy
_except_handler3
ntdll
ZwQueryInformationThread
shlwapi
PathFileExistsA
SHDeleteKeyA
psapi
GetModuleInformation
ws2_32
WSAStartup
send
WSACleanup
freeaddrinfo
socket
getaddrinfo
WSAAddressToStringA
htons
inet_addr
connect
gethostbyname
closesocket
gethostname
iphlpapi
GetAdaptersInfo
wintrust
WinVerifyTrust
mpr
WNetOpenEnumA
WNetCloseEnum
WNetAddConnection2A
WNetCancelConnection2A
rpcrt4
UuidToStringA
UuidFromStringA
kernel32
GetExitCodeThread
TransactNamedPipe
GlobalAlloc
GlobalFree
GetLocalTime
CreatePipe
MoveFileExA
GetCurrentProcessId
OpenThread
CreateNamedPipeA
FlushFileBuffers
DisconnectNamedPipe
GetLogicalDrives
WaitForSingleObject
Thread32Next
ConnectNamedPipe
TerminateThread
FlushViewOfFile
SetNamedPipeHandleState
FindNextFileA
FindClose
GetCurrentProcess
SetFileAttributesA
CreateDirectoryA
CreateFileA
FindResourceA
FreeResource
lstrlenA
FreeLibrary
Process32First
GetTickCount
WriteFile
Sleep
SizeofResource
ReadFile
lstrcmpiA
GetProcAddress
Process32Next
LockResource
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
CreateToolhelp32Snapshot
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
lstrcpyA
ExitProcess
GetFileSize
SetFilePointer
VirtualQuery
SetEndOfFile
SetFileTime
GetWindowsDirectoryA
MultiByteToWideChar
LoadLibraryA
GetFileTime
GetCurrentThreadId
RemoveDirectoryA
SetEvent
CreateEventA
GetLastError
MapViewOfFile
UnmapViewOfFile
OpenProcess
ExitThread
CopyFileA
CreateFileMappingA
WinExec
GetVersion
CreateThread
lstrcatA
CreateProcessA
TerminateProcess
GetSystemDirectoryA
DeviceIoControl
lstrcpynA
GetDriveTypeA
GetExitCodeProcess
FindFirstFileA
GetLogicalDriveStringsA
GetFileAttributesA
user32
wsprintfA
GetMessageA
SetThreadDesktop
OpenWindowStationA
OpenDesktopA
SetProcessWindowStation
PostThreadMessageA
GetInputState
advapi32
StartServiceA
QueryServiceStatus
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenServiceA
CloseServiceHandle
RegQueryValueExA
CreateServiceA
OpenProcessToken
CreateProcessAsUserA
ControlService
OpenSCManagerA
RegCreateKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UPX1 Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eusfzih Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE