CreateInterface
Behavioral task
behavioral1
Sample
4f0fcc3a502ff0aaca240703ec60006e9fc68c08816e01898b827a0461e7b9db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f0fcc3a502ff0aaca240703ec60006e9fc68c08816e01898b827a0461e7b9db.exe
Resource
win10v2004-20220812-en
General
-
Target
4f0fcc3a502ff0aaca240703ec60006e9fc68c08816e01898b827a0461e7b9db
-
Size
484KB
-
MD5
5c32569bad5a7ae2d04fab6916fd2942
-
SHA1
0de9e3fcfb553ebc5788d0bd9b3268d93e1c5433
-
SHA256
4f0fcc3a502ff0aaca240703ec60006e9fc68c08816e01898b827a0461e7b9db
-
SHA512
492f77fdb7e3f9e85aa66ef918921662552c752abd86e2fc076d989d356ceda7cf4227d988dbdfce5f5f90e17e6dc7cc9587b7da41bde098a1ffc83ae4134e82
-
SSDEEP
12288:wMeCb6yOIKgUnqN9ugSNkvm9f+MgvLwabghCE2SN7YDa2sz6J7yCXjmZfMc3ed/l:6OSN7YDa2sWJ7yim5Dw
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4f0fcc3a502ff0aaca240703ec60006e9fc68c08816e01898b827a0461e7b9db.exe windows x86
bbaab436b0a0f9766fe839baf83a4d20
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
WSACleanup
gethostname
getsockname
ioctlsocket
gethostbyname
ntohs
htons
kernel32
CompareStringA
CreateProcessA
GetExitCodeProcess
GetFileAttributesA
CreateEventA
ResetEvent
WaitForSingleObject
SetConsoleScreenBufferSize
SetConsoleWindowInfo
GetConsoleScreenBufferInfo
GetLargestConsoleWindowSize
MapViewOfFile
UnmapViewOfFile
ReadConsoleOutputCharacterA
WriteConsoleInputA
WaitForMultipleObjects
SetEvent
GetStdHandle
CloseHandle
Sleep
SetConsoleTitleA
GetTickCount
GetCurrentProcessId
GetConsoleTitleA
SetConsoleCtrlHandler
AllocConsole
CompareStringW
GetNumberOfConsoleInputEvents
ReadConsoleInputA
WriteFile
WriteConsoleOutputCharacterA
WriteConsoleOutputAttribute
GetProcAddress
LoadLibraryA
FreeLibrary
GetModuleHandleA
GetCurrentDirectoryA
GetModuleFileNameA
GlobalFree
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
CreateFileA
ReadFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFilePointer
RaiseException
GetVersionExA
GetUserDefaultLCID
SetUnhandledExceptionFilter
SetEndOfFile
GetLocaleInfoW
FreeConsole
InterlockedIncrement
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
GetFileType
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetTimeZoneInformation
InterlockedDecrement
IsBadCodePtr
GetLastError
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
SetEnvironmentVariableA
SetCurrentDirectoryA
CreateDirectoryA
GetStartupInfoA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
DebugBreak
OutputDebugStringA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
TlsAlloc
SetLastError
TlsGetValue
UnhandledExceptionFilter
RtlUnwind
GetFullPathNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
user32
wsprintfA
FindWindowA
PeekMessageA
TranslateMessage
GetMessageA
DispatchMessageA
PostMessageA
MessageBoxA
ShowWindow
SetWindowPos
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
shell32
CommandLineToArgvW
winmm
timeGetTime
steam
SteamMountFilesystem
Exports
Exports
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE