Behavioral task
behavioral1
Sample
09c7e05e27b32bc17d46ecd25e36be759c1ae05dde051c48c92d6e6ab75c5789.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
09c7e05e27b32bc17d46ecd25e36be759c1ae05dde051c48c92d6e6ab75c5789.exe
Resource
win10v2004-20220812-en
General
-
Target
09c7e05e27b32bc17d46ecd25e36be759c1ae05dde051c48c92d6e6ab75c5789
-
Size
205KB
-
MD5
56651de8840e0d621be0110fa4954402
-
SHA1
413f174e8c32d5ea9ac4a24ae311aa1431bcfd67
-
SHA256
09c7e05e27b32bc17d46ecd25e36be759c1ae05dde051c48c92d6e6ab75c5789
-
SHA512
d7681331f87f4e9fa2330456185925d348c69059651c59fec0cefb5d45fcbfde57ed6a608ca510be39a19eb0c183f7d84a0ee21d625318ef4cc1b5dfd06feadf
-
SSDEEP
3072:XHbE/AILyjEvb9ZVPnj2jGXKf7c8IDhWZDxxWbr3ieXcgVydr0IBJOdi+JRDSuuq:XHlPEvbHV8GXKz2hKDWfL60Mocm/VbZ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
09c7e05e27b32bc17d46ecd25e36be759c1ae05dde051c48c92d6e6ab75c5789.exe windows x86
8b48f8e518a643cd2b45d82df0c25a26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegConnectRegistryW
RegSetValueExW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
kernel32
CompareStringW
GetComputerNameW
VirtualQuery
VirtualAlloc
VirtualFree
FindClose
FindFirstFileW
GetVolumeInformationW
GetDriveTypeW
GetSystemDirectoryW
GetLogicalDrives
GetConsoleScreenBufferInfo
GetStdHandle
CloseHandle
OpenProcess
GetCurrentProcess
GetTimeFormatW
SetThreadUILanguage
FileTimeToSystemTime
GetModuleFileNameW
SetConsoleMode
ReadFile
ReadConsoleW
WriteConsoleW
ExitProcess
GetConsoleOutputCP
HeapReAlloc
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
lstrlenW
lstrlenA
GetFileType
GetConsoleMode
VerifyVersionInfoW
FormatMessageW
LocalFree
UnhandledExceptionFilter
TerminateProcess
GetLastError
SetLastError
GetComputerNameExW
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
msvcrt
__iob_func
wcstod
wcstol
__p__commode
fprintf
_controlfp
_except_handler4_common
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
wcstok
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
??3@YAXPAX@Z
_wgetcwd
??_U@YAPAXI@Z
wcstoul
_CxxThrowException
??_V@YAXPAX@Z
__CxxFrameHandler3
_vsnwprintf
memset
_iob
_memicmp
_get_osfhandle
_errno
_fileno
fflush
user32
CharUpperW
LoadStringW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
netapi32
NetFileClose
NetFileEnum
NetApiBufferFree
NetServerGetInfo
secur32
GetUserNameExW
ws2_32
WSAGetLastError
WSAStartup
FreeAddrInfoW
GetNameInfoW
WSACleanup
WSALookupServiceBeginW
WSALookupServiceNextW
WSALookupServiceEnd
GetAddrInfoW
framedynos
?Find@CHString@@QBEHPBG@Z
??1CHString@@QAE@XZ
??4CHString@@QAEABV0@PBG@Z
??0CHString@@QAE@XZ
??4CHString@@QAEABV0@ABV0@@Z
?Mid@CHString@@QBE?AV1@H@Z
??YCHString@@QAEABV0@PBG@Z
?Right@CHString@@QBE?AV1@H@Z
?GetData@CHString@@IBEPAUCHStringData@@XZ
?Format@CHString@@QAAXPBGZZ
??0CHString@@QAE@PBG@Z
?Left@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@HH@Z
ntdll
NtQuerySystemInformation
RtlAllocateHeap
VerSetConditionMask
RtlInitUnicodeString
shlwapi
StrStrIW
StrChrW
StrChrIW
StrStrW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE