Behavioral task
behavioral1
Sample
cbb1ae2cb9f8cb111007528fc89fd7669987821e9ab25f1a6980ecba006ff9da.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cbb1ae2cb9f8cb111007528fc89fd7669987821e9ab25f1a6980ecba006ff9da.exe
Resource
win10v2004-20220901-en
General
-
Target
cbb1ae2cb9f8cb111007528fc89fd7669987821e9ab25f1a6980ecba006ff9da
-
Size
271KB
-
MD5
6b50ca9f3f4d24bc4f8b3d8a87373ab0
-
SHA1
a5feae3288290121994c47f8cd2bdaacb82e3dd4
-
SHA256
cbb1ae2cb9f8cb111007528fc89fd7669987821e9ab25f1a6980ecba006ff9da
-
SHA512
f5b6d4c4563b2f71832360aef416042a3f13b29e584e6271441eb3e9327d28dcf875e15a992c5a957b57a6470b37014900e302075dc2003fb71fcd11fb01ca35
-
SSDEEP
6144:MY1lblGg5FyPsGMXeFTvdjciEUMY07UTCHkeSZKp8P55paf+3m9GixBinW9Q:PZG6ykGMCchUMY07MBZDpaf+WTSnW9Q
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cbb1ae2cb9f8cb111007528fc89fd7669987821e9ab25f1a6980ecba006ff9da.exe windows x86
78813ac1c259270ab5e5660d7fe75110
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
nwprovau
NwEnumConnections
NwSetLogonScript
NwQueryInfo
NPOpenEnum
advapi32
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegSetValueExA
RegCreateKeyExW
kernel32
IsValidCodePage
GetLastError
LocalFree
LocalAlloc
GetEnvironmentVariableA
MultiByteToWideChar
WideCharToMultiByte
WriteConsoleW
GetStdHandle
CloseHandle
IsDBCSLeadByte
SetConsoleCursorPosition
ScrollConsoleScreenBufferA
GetConsoleScreenBufferInfo
CreateFileW
GetTimeFormatW
GetDateFormatW
ReadFile
GetSystemDefaultLCID
FileTimeToSystemTime
DosDateTimeToFileTime
GetTimeZoneInformation
SetConsoleCtrlHandler
GetDriveTypeA
SetFilePointer
CreateFileA
GetModuleHandleA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
HeapFree
GetCurrentDirectoryA
SetCurrentDirectoryA
HeapAlloc
GetSystemTimeAsFileTime
Beep
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
SetEnvironmentVariableA
GetFullPathNameA
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetProcessHeap
GetStringTypeA
GetStringTypeW
VirtualAlloc
HeapReAlloc
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetEnvironmentVariableW
GetFileAttributesA
LoadLibraryA
GetACP
GetOEMCP
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
RtlUnwind
GetLocaleInfoW
SetEndOfFile
user32
LoadStringA
CharPrevA
wsprintfW
LoadStringW
mpr
WNetOpenEnumW
WNetEnumResourceA
WNetGetConnection2A
WNetGetConnectionA
WNetCloseEnum
WNetAddConnection2A
WNetCancelConnection2A
WNetGetLastErrorW
ntdll
NtClose
RtlInitUnicodeString
_strcmpi
RtlUnicodeStringToOemString
RtlOemStringToUnicodeString
NtFsControlFile
NtOpenFile
nwapi32
NWDetachFromFileServer
NWGetFileServerVersionInfo
NwNdsReadObjectInfo
NwNdsOpenGenericHandle
NWGetObjectName
NwlibMakeNcp
NWAttachToFileServer
NWReadPropertyValue
NwNdsOpenStream
NwNdsReadAttribute
NwNdsOpenTreeHandle
NwNdsSetTreeContext
NwNdsGetTreeContext
NwNdsResolveName
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 148KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE