Behavioral task
behavioral1
Sample
53c1e96aaa9268c0adcfaaa5b38ec6dc16830db3ffa94ab61cf75ed3ff7b4939.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53c1e96aaa9268c0adcfaaa5b38ec6dc16830db3ffa94ab61cf75ed3ff7b4939.exe
Resource
win10v2004-20220901-en
General
-
Target
53c1e96aaa9268c0adcfaaa5b38ec6dc16830db3ffa94ab61cf75ed3ff7b4939
-
Size
180KB
-
MD5
92e6f7d2e351cd84651bc2cb5b96278a
-
SHA1
68f8991c45782ec04c4ef776cd0a7585e39f2ca4
-
SHA256
53c1e96aaa9268c0adcfaaa5b38ec6dc16830db3ffa94ab61cf75ed3ff7b4939
-
SHA512
e3290f5d3354e6b1fca4914431ae592a91be13ebcc8ec2bbd8534b0869d895bfdd31a670b3b9b7b7334279a3f01f61a1daa9c9c59262f65051486a9e6a01e658
-
SSDEEP
3072:uzCWISby44zo91qjkCwy2t94so1yg7y0leDGDWG:urCTs90FW4b73ld5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
53c1e96aaa9268c0adcfaaa5b38ec6dc16830db3ffa94ab61cf75ed3ff7b4939.exe windows x86
66170160ffbe112813cc1e239008f816
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyA
RegDeleteValueW
SetNamedSecurityInfoW
SetEntriesInAclA
GetNamedSecurityInfoW
RegQueryInfoKeyW
RegQueryValueExW
RegEnumKeyExW
RegEnumValueW
kernel32
OutputDebugStringA
WriteFile
CreateFileW
GetSystemWindowsDirectoryW
CloseHandle
GetProcAddress
LoadLibraryW
FindClose
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
CreateDirectoryW
GetFileAttributesW
DeleteFileW
SetFileAttributesW
CopyFileW
GetSystemTimeAsFileTime
GetCommandLineW
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetLastError
GetFullPathNameW
ExitProcess
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
HeapAlloc
GetCurrentDirectoryW
LCMapStringA
WideCharToMultiByte
LCMapStringW
LoadLibraryA
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
GetDriveTypeA
GetLocaleInfoA
GetCPInfo
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
wsprintfW
LoadStringW
MessageBoxW
shell32
CommandLineToArgvW
ntdll
NtWriteFile
strchr
isdigit
strspn
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
RtlFreeHeap
RtlQueryEnvironmentVariable_U
NtMapViewOfSection
NtCreateSection
NtQueryInformationFile
NtUnmapViewOfSection
NtProtectVirtualMemory
NtAllocateVirtualMemory
NtFreeVirtualMemory
NtQuerySystemInformation
NtQueryVirtualMemory
RtlAnsiStringToUnicodeString
RtlUnicodeStringToInteger
RtlAllocateHeap
DbgPrint
RtlExpandEnvironmentStrings_U
RtlGetVersion
NtSetInformationFile
RtlInitAnsiString
strpbrk
NtOpenKey
NtCreateKey
NtSetValueKey
NtSetInformationKey
sprintf
RtlUpcaseUnicodeString
RtlCopyUnicodeString
qsort
NtClose
RtlDosPathNameToNtPathName_U
NtDeleteFile
NtCreateFile
RtlGUIDFromString
RtlInitUnicodeString
NtDeleteKey
RtlStringFromGUID
RtlFreeUnicodeString
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE