Behavioral task
behavioral1
Sample
86b6fab3b797025a3284358d7e841ab00281fff209f97b085be79902418c20ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86b6fab3b797025a3284358d7e841ab00281fff209f97b085be79902418c20ed.exe
Resource
win10v2004-20220812-en
General
-
Target
86b6fab3b797025a3284358d7e841ab00281fff209f97b085be79902418c20ed
-
Size
488KB
-
MD5
44d5efeba9b74e77c5222660221136e0
-
SHA1
40b3e865b43a88d2ecbac17cdf2babdfda284028
-
SHA256
86b6fab3b797025a3284358d7e841ab00281fff209f97b085be79902418c20ed
-
SHA512
8d2c0f7f730cd1e32e951d1a9239aaa76863da9227c139d971c20c48eeb9eb8dbb7521f7f3f3f490152126a851a8254283f5e1e469c8b048cf79bcfce9e070f0
-
SSDEEP
6144:1IvLqgsbsSrLZCgvzxmX3wtKDUbHwkBYK5Tz77uCYXilJbg5O5/9W:1I+vXZCgLoXFUdYK5/7+XST5l
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
86b6fab3b797025a3284358d7e841ab00281fff209f97b085be79902418c20ed.exe windows x86
8c316d2fb2abe0cd59df5a644cc05251
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ntohl
send
gethostname
WSACleanup
gethostbyname
inet_ntoa
WSAStartup
inet_addr
recv
socket
htons
closesocket
connect
netapi32
Netbios
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
HeapCreate
HeapDestroy
LCMapStringW
LCMapStringA
CreateDirectoryW
WaitForSingleObject
GetLastError
GetCurrentThreadId
OpenThread
CreateMutexW
CreateThread
QueryPerformanceCounter
GetTickCount
CloseHandle
GetFileSize
CreateFileW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
lstrlenA
lstrlenW
GetCommandLineW
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
RaiseException
InterlockedDecrement
GetFileAttributesW
GetSystemDirectoryW
GetVersionExW
ReadFile
DeleteFileW
WriteFile
GetProcessTimes
FindFirstFileW
QueryPerformanceFrequency
SetFilePointer
MoveFileW
VirtualQuery
FindClose
GetCurrentProcessId
GetCurrentProcess
LoadLibraryA
SetFileAttributesW
GetModuleFileNameW
GetModuleHandleW
GetSystemTimeAsFileTime
GetModuleHandleA
SetProcessAffinityMask
GetProcessAffinityMask
DeviceIoControl
FreeLibrary
CreateProcessW
CreatePipe
GetStdHandle
DuplicateHandle
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
ExitProcess
SetLastError
TlsFree
TlsSetValue
TlsAlloc
VirtualFree
TlsGetValue
RtlUnwind
GetStartupInfoW
GetProcessHeap
GetVersionExA
HeapSize
HeapAlloc
HeapReAlloc
HeapFree
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
SetStdHandle
FlushFileBuffers
VirtualAlloc
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
WriteConsoleA
WriteConsoleW
SetEndOfFile
CreateFileA
Sleep
GetThreadLocale
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
GetLocaleInfoA
InterlockedExchange
user32
IsWindow
RegisterClassExW
DestroyWindow
SendMessageW
GetClassInfoExW
PostThreadMessageW
LoadMenuW
GetDesktopWindow
SetForegroundWindow
GetCursorPos
DestroyMenu
TrackPopupMenu
CharNextW
CharLowerA
SetTimer
SetWindowLongW
DefWindowProcW
ShowWindow
TranslateMessage
DispatchMessageW
KillTimer
CreateWindowExW
RegisterClassW
UpdateWindow
GetWindowLongW
PostMessageW
LoadImageW
CharLowerW
GetSubMenu
GetMessageW
gdi32
GetStockObject
advapi32
RegSetValueExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegCreateKeyW
shell32
ShellExecuteExW
Shell_NotifyIconW
SHFileOperationW
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
CommandLineToArgvW
SHGetPathFromIDListW
ole32
CoLoadLibrary
StringFromCLSID
CLSIDFromProgID
CoTaskMemFree
CoFreeLibrary
oleaut32
SysFreeString
SysStringLen
shlwapi
PathFileExistsW
wnsprintfW
wintrust
CryptCATAdminEnumCatalogFromHash
CryptCATAdminCalcHashFromFileHandle
WTHelperGetProvCertFromChain
WTHelperGetProvSignerFromChain
WinVerifyTrust
CryptCATAdminAcquireContext
WTHelperProvDataFromStateData
CryptCATAdminReleaseCatalogContext
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseContext
crypt32
CertGetNameStringW
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE