Behavioral task
behavioral1
Sample
306f1fd411bb28de75d2231ab9d6072b6828ab7901755aedf57c94b522f26d1d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
306f1fd411bb28de75d2231ab9d6072b6828ab7901755aedf57c94b522f26d1d.exe
Resource
win10v2004-20220812-en
General
-
Target
306f1fd411bb28de75d2231ab9d6072b6828ab7901755aedf57c94b522f26d1d
-
Size
157KB
-
MD5
71d4964477bb7f19ae2ffd63d1b228a6
-
SHA1
a134cc99f99e7ed92a3d483b71645ad03ecd487b
-
SHA256
306f1fd411bb28de75d2231ab9d6072b6828ab7901755aedf57c94b522f26d1d
-
SHA512
05dc2755780233ff46e0c24a9cfa013fdb95a51ab91b8008abb3ddd7db98a7ce9186c279a6e7382a19469114efaaa8e27d9c1e8f984df74ce14702fa16e08754
-
SSDEEP
3072:ajWzjZk8S0BzK1s5/wEu50mvc5ry5k1LYnSyQbNh+Nx5xHcxPak3ClmBN7yM:aKJkUddJGVUryQU0xyZaN7yM
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
306f1fd411bb28de75d2231ab9d6072b6828ab7901755aedf57c94b522f26d1d.exe windows x86
22d602c3d8e6f25ecb33fde5f8427bd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
AuditFree
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
LookupAccountNameW
ConvertStringSidToSidW
AuditLookupSubCategoryNameW
AuditEnumerateSubCategories
AuditLookupCategoryNameW
AuditEnumerateCategories
ConvertSecurityDescriptorToStringSecurityDescriptorW
AuditQuerySecurity
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
AuditSetSecurity
RegSetValueExW
LsaFreeMemory
LsaClose
LsaLookupSids
LsaNtStatusToWinError
LsaOpenPolicy
AuditEnumeratePerUserPolicy
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
AuditQueryGlobalSaclW
AuditSetGlobalSaclW
AuditQuerySystemPolicy
AuditQueryPerUserPolicy
AuditSetSystemPolicy
AuditSetPerUserPolicy
GetSecurityDescriptorSacl
EqualSid
DeleteAce
GetAce
GetAclInformation
LookupAccountSidW
kernel32
CompareStringW
GetConsoleOutputCP
SetThreadPreferredUILanguages
HeapSetInformation
LocalFree
CloseHandle
GetLastError
GetCurrentProcess
GetComputerNameW
FormatMessageW
LocalAlloc
CreateFileW
DeleteFileW
WriteFile
WideCharToMultiByte
WriteConsoleW
GetStdHandle
VirtualAlloc
VirtualProtect
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetVersion
msvcrt
ferror
feof
fgetws
_wfopen
wscanf
qsort
vfwprintf
_vsnwprintf_s
_wtoi
free
_callnewh
malloc
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_except_handler4_common
_controlfp
fclose
_purecall
memset
wcschr
??0exception@@QAE@XZ
__CxxFrameHandler3
wprintf
_CxxThrowException
memcpy
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
memmove_s
memcpy_s
_wcsnicmp
_wcsicmp
_wsetlocale
_iob
_vsnwprintf
??0exception@@QAE@ABQBD@Z
ntdll
RtlCompareMemory
RtlGUIDFromString
RtlNtStatusToDosError
RtlFreeHeap
RtlAllocateHeap
RtlImageNtHeader
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE