Behavioral task
behavioral1
Sample
9d700f8642e41bbbebf9513dcdfcf4ccc329eb468f388852cd34ec5fe32ade8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d700f8642e41bbbebf9513dcdfcf4ccc329eb468f388852cd34ec5fe32ade8c.exe
Resource
win10v2004-20220901-en
General
-
Target
9d700f8642e41bbbebf9513dcdfcf4ccc329eb468f388852cd34ec5fe32ade8c
-
Size
236KB
-
MD5
712568ddd8cf4c09c5e82c49932acdc2
-
SHA1
e4681312b9ee1dfffc75409ffef3f4a4d869b013
-
SHA256
9d700f8642e41bbbebf9513dcdfcf4ccc329eb468f388852cd34ec5fe32ade8c
-
SHA512
6a2787f57ad897e16c67e1899391ecaf6446dbc61c482c0f24917e93853ada9407ad45e7c52abf5cf1550b371fea424b6c7732d84ef16600c41444224a8bf3f2
-
SSDEEP
3072:BY6cTrlRAZkFMsMx67aPGDOCEO2lVi7En/wPOzQzULBvfD+Q7QePuQOzkTZRlR5:BYZ3lFMsMxCDOCzZLziF+Q8ePvTZR5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9d700f8642e41bbbebf9513dcdfcf4ccc329eb468f388852cd34ec5fe32ade8c.exe windows x86
7f7be2b0b61435ddfc76b0c5298f50c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
nwprovau
NwEnumConnections
NwSetLogonScript
NwQueryInfo
NPOpenEnum
advapi32
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegSetValueExA
RegCreateKeyExW
kernel32
VirtualAlloc
GetLastError
LocalFree
LocalAlloc
GetEnvironmentVariableA
MultiByteToWideChar
WideCharToMultiByte
WriteConsoleW
GetStdHandle
CloseHandle
IsDBCSLeadByte
SetConsoleCursorPosition
ScrollConsoleScreenBufferA
GetConsoleScreenBufferInfo
CreateFileW
GetTimeFormatW
GetDateFormatW
ReadFile
GetSystemDefaultLCID
FileTimeToSystemTime
DosDateTimeToFileTime
GetTimeZoneInformation
SetConsoleCtrlHandler
GetDriveTypeA
SetFilePointer
CreateFileA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
ExitProcess
GetProcAddress
GetModuleHandleA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
Sleep
Beep
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
SetEnvironmentVariableA
GetFullPathNameA
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetCurrentProcessId
HeapReAlloc
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetEnvironmentVariableW
GetFileAttributesA
LoadLibraryA
GetACP
GetOEMCP
RtlUnwind
InterlockedExchange
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetLocaleInfoW
SetEndOfFile
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
user32
LoadStringA
CharPrevA
wsprintfW
LoadStringW
mpr
WNetOpenEnumW
WNetEnumResourceA
WNetGetConnection2A
WNetGetConnectionA
WNetCloseEnum
WNetAddConnection2A
WNetCancelConnection2A
WNetGetLastErrorW
ntdll
NtClose
RtlInitUnicodeString
_strcmpi
RtlUnicodeStringToOemString
RtlOemStringToUnicodeString
NtFsControlFile
NtOpenFile
nwapi32
NWDetachFromFileServer
NWGetFileServerVersionInfo
NwNdsReadObjectInfo
NwNdsOpenGenericHandle
NWGetObjectName
NwlibMakeNcp
NWAttachToFileServer
NWReadPropertyValue
NwNdsOpenStream
NwNdsReadAttribute
NwNdsOpenTreeHandle
NwNdsSetTreeContext
NwNdsGetTreeContext
NwNdsResolveName
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE