Behavioral task
behavioral1
Sample
5e6af3a6f97c3ecc0f4837d53b8c16d506178331b08e212f14703aec47b7de4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e6af3a6f97c3ecc0f4837d53b8c16d506178331b08e212f14703aec47b7de4b.exe
Resource
win10v2004-20220812-en
General
-
Target
5e6af3a6f97c3ecc0f4837d53b8c16d506178331b08e212f14703aec47b7de4b
-
Size
231KB
-
MD5
0dd4baba81e4f202ee6aa9194eb60ace
-
SHA1
af4a36406b362a5f819e4983f4653196a3c7e1fb
-
SHA256
5e6af3a6f97c3ecc0f4837d53b8c16d506178331b08e212f14703aec47b7de4b
-
SHA512
d075b6e143b8d937a6cc4e56b5d89690c18bc7cd64d2b35e01ba833afb58daab184454be0ce54d8a3ad78ab20f6cc6550662d2a51b60f143e69939c197dba5f0
-
SSDEEP
3072:LY6I93/sQRlkp5g5zRLPxB+ftGMpHjZDcTDdPc6PDcacuCn6uFsthYbmOOXlU5Tp:LY1lblGg5FLPsGMXeFT26uv/k3mtJLv
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5e6af3a6f97c3ecc0f4837d53b8c16d506178331b08e212f14703aec47b7de4b.exe windows x86
78813ac1c259270ab5e5660d7fe75110
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
nwprovau
NwEnumConnections
NwSetLogonScript
NwQueryInfo
NPOpenEnum
advapi32
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegSetValueExA
RegCreateKeyExW
kernel32
IsValidCodePage
GetLastError
LocalFree
LocalAlloc
GetEnvironmentVariableA
MultiByteToWideChar
WideCharToMultiByte
WriteConsoleW
GetStdHandle
CloseHandle
IsDBCSLeadByte
SetConsoleCursorPosition
ScrollConsoleScreenBufferA
GetConsoleScreenBufferInfo
CreateFileW
GetTimeFormatW
GetDateFormatW
ReadFile
GetSystemDefaultLCID
FileTimeToSystemTime
DosDateTimeToFileTime
GetTimeZoneInformation
SetConsoleCtrlHandler
GetDriveTypeA
SetFilePointer
CreateFileA
GetModuleHandleA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
HeapFree
GetCurrentDirectoryA
SetCurrentDirectoryA
HeapAlloc
GetSystemTimeAsFileTime
Beep
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
SetEnvironmentVariableA
GetFullPathNameA
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetProcessHeap
GetStringTypeA
GetStringTypeW
VirtualAlloc
HeapReAlloc
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetEnvironmentVariableW
GetFileAttributesA
LoadLibraryA
GetACP
GetOEMCP
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
RtlUnwind
GetLocaleInfoW
SetEndOfFile
user32
LoadStringA
CharPrevA
wsprintfW
LoadStringW
mpr
WNetOpenEnumW
WNetEnumResourceA
WNetGetConnection2A
WNetGetConnectionA
WNetCloseEnum
WNetAddConnection2A
WNetCancelConnection2A
WNetGetLastErrorW
ntdll
NtClose
RtlInitUnicodeString
_strcmpi
RtlUnicodeStringToOemString
RtlOemStringToUnicodeString
NtFsControlFile
NtOpenFile
nwapi32
NWDetachFromFileServer
NWGetFileServerVersionInfo
NwNdsReadObjectInfo
NwNdsOpenGenericHandle
NWGetObjectName
NwlibMakeNcp
NWAttachToFileServer
NWReadPropertyValue
NwNdsOpenStream
NwNdsReadAttribute
NwNdsOpenTreeHandle
NwNdsSetTreeContext
NwNdsGetTreeContext
NwNdsResolveName
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE