Behavioral task
behavioral1
Sample
5938e84123674de767c3c30831c6b21a9b27917990d1d163a1291161c9b67558.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5938e84123674de767c3c30831c6b21a9b27917990d1d163a1291161c9b67558.exe
Resource
win10v2004-20220812-en
General
-
Target
5938e84123674de767c3c30831c6b21a9b27917990d1d163a1291161c9b67558
-
Size
173KB
-
MD5
705ed3916578bc06fdecc61fedbde373
-
SHA1
95142b16929c4a947913166942c0617ddfe99f6a
-
SHA256
5938e84123674de767c3c30831c6b21a9b27917990d1d163a1291161c9b67558
-
SHA512
d8d5b9b0d05fd59779d3da473502779a649e1bfc427d73f549ccf763058c42a200b93d1f957e48425210ac7d42e5757d8fde7027b820e8548b04c556757bba31
-
SSDEEP
3072:MsxPoiAzja1m3SJDi3B+x7tICUQA673RXzZi0KSXz0tDkr2MQB:MsxPoiAcm3SJDi3gfA67BXdi0KSA2
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5938e84123674de767c3c30831c6b21a9b27917990d1d163a1291161c9b67558.exe windows x86
9a077c1e719995ee0605f9ac7e9ba0ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
InterlockedDecrement
WriteConsoleW
GetStdHandle
GetLastError
GetProcAddress
GetModuleHandleA
FormatMessageW
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
lstrlenW
LocalAlloc
QueryPerformanceCounter
FileTimeToSystemTime
GetModuleFileNameW
GetTimeFormatW
GetComputerNameExW
GetConsoleOutputCP
ExitProcess
GetSystemDirectoryW
LoadLibraryW
FreeLibrary
HeapReAlloc
HeapFree
SetConsoleMode
ReadFile
ReadConsoleW
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
CompareStringW
lstrlenA
GetFileType
GetConsoleMode
VerSetConditionMask
VerifyVersionInfoW
LocalFree
InterlockedIncrement
msvcrt
??3@YAXPAX@Z
_wcsicmp
??2@YAPAXI@Z
strtok
wcstok
fprintf
?terminate@@YAXXZ
_controlfp
??1type_info@@UAE@XZ
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_CxxThrowException
wcsstr
_iob
__CxxFrameHandler
_errno
_get_osfhandle
_fileno
_vsnwprintf
wcstod
wcstoul
wcstol
fflush
user32
CharUpperW
LoadStringW
wsprintfW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
ole32
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SysStringLen
SysFreeString
VariantInit
VariantCopy
VariantChangeType
VariantClear
SysAllocString
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SysAllocStringByteLen
secur32
GetUserNameExW
ws2_32
WSAGetLastError
WSACleanup
inet_addr
gethostbyaddr
WSAStartup
framedyn
?Compare@CHString@@QBEHPBG@Z
?Empty@CHString@@QAEXXZ
?Mid@CHString@@QBE?AV1@HH@Z
?SetAt@CHString@@QAEXHG@Z
?Format@CHString@@QAAXPBGZZ
?FindOneOf@CHString@@QBEHPBG@Z
??0CHString@@QAE@PBG@Z
?GetBufferSetLength@CHString@@QAEPAGH@Z
?ReleaseBuffer@CHString@@QAEXH@Z
??YCHString@@QAEABV0@PBG@Z
??0CHString@@QAE@XZ
??4CHString@@QAEABV0@PBG@Z
?Find@CHString@@QBEHG@Z
?Left@CHString@@QBE?AV1@H@Z
??4CHString@@QAEABV0@ABV0@@Z
??1CHString@@QAE@XZ
?Mid@CHString@@QBE?AV1@H@Z
?GetData@CHString@@IBEPAUCHStringData@@XZ
netapi32
NetServerGetInfo
NetApiBufferFree
NetWkstaTransportEnum
shlwapi
StrStrIW
StrChrW
StrStrW
StrChrIW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE