Static task
static1
Behavioral task
behavioral1
Sample
yellow.exe
Resource
win7-20220812-en
General
-
Target
yellow.exe
-
Size
339KB
-
MD5
42febc30a814484455ee8f31ee2f2d88
-
SHA1
b71332d1aacc1907cdaeaad0cc987621c893f8e7
-
SHA256
30a62745d4c135ee3bec73a1d4903cb42add1b2d846c16e65e73ffca41386cf2
-
SHA512
5f1ecc012dd5e0aa8e5e3d9d9c1b4789a1958d0344e99ebcb105561d118e8d0d22cf24a25348fefc28a9e7e26f4b12f57bc109310a6301bba974f8c17fc70646
-
SSDEEP
6144:sZ6x/LI00cM0sESu/EqftVPsXdrRwuMkoh6p7EZ7+:NLMIS9adUWko2YZ6
Malware Config
Signatures
Files
-
yellow.exe.exe windows x64
ff2689ea799064582116988853471af0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
DeleteFileW
CloseHandle
LoadLibraryW
GetProcAddress
CopyFileW
lstrcmpW
lstrcmpA
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
RemoveDirectoryW
GetProcessHeap
GetFileAttributesW
GetTempPathW
CreateFileW
FindClose
lstrlenA
FindNextFileW
GetFileSizeEx
FindFirstFileW
ReadFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapReAlloc
CreateDirectoryW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetCommandLineW
GetCommandLineA
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
RtlUnwind
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
bcrypt
BCryptDecrypt
BCryptOpenAlgorithmProvider
BCryptSetProperty
BCryptGenerateSymmetricKey
crypt32
CryptUnprotectData
ws2_32
closesocket
WSACleanup
WSAStartup
getaddrinfo
recv
socket
connect
Sections
.text Size: 231KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ