Behavioral task
behavioral1
Sample
db575db7f104a6987a6b6f7b12910f43c1cd34db79c7aab869e12733e69dbda2.exe
Resource
win7-20220812-en
General
-
Target
db575db7f104a6987a6b6f7b12910f43c1cd34db79c7aab869e12733e69dbda2
-
Size
218KB
-
MD5
0e6fe64910a33a61c2977f13c125e4ff
-
SHA1
356bc1d80b7e759aeb50828873f4b21c49f52067
-
SHA256
db575db7f104a6987a6b6f7b12910f43c1cd34db79c7aab869e12733e69dbda2
-
SHA512
08e688adda6a6514248c056ad499ce029656cd8a36c6869bbfe294cf5f17806c8873fdb62e1a3ba57f3b0ba139e55594fd984e7c36633d01e1983ee401bdbcce
-
SSDEEP
6144:sbpG8jWNH1NkV584yYVIHJIufUG6yOQXjGRcUOlOx6+tz:hZVWV5lyYV2Jdf76yJX6RrOgx6+tz
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
db575db7f104a6987a6b6f7b12910f43c1cd34db79c7aab869e12733e69dbda2.exe windows x86
20902e75edc1c9ee8fb94a2345a302cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_wcslwr
towlower
setlocale
_c_exit
_exit
_XcptFilter
wcsstr
__winitenv
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
isalpha
tolower
exit
atoi
towupper
toupper
_strnicmp
strncmp
wcstok
_wcsnicmp
_wtoi
_snprintf
wcsncat
wcscat
wcscpy
calloc
strncpy
strtoul
strchr
sprintf
memchr
_cexit
__set_app_type
_except_handler3
_controlfp
wcscmp
wcsncpy
iswctype
_wcsicmp
_snwprintf
wcslen
_vsnwprintf
malloc
free
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
LookupAccountSidW
GetUserNameW
kernel32
GetStdHandle
CreateThread
ExitProcess
GetConsoleOutputCP
GetModuleHandleW
SetLastError
GetSystemDefaultLangID
SetConsoleCtrlHandler
CreateEventW
CreateConsoleScreenBuffer
PulseEvent
GetConsoleMode
SetUnhandledExceptionFilter
ReadConsoleInputW
ReadConsoleInputA
MultiByteToWideChar
GetConsoleCursorInfo
QueryPerformanceCounter
GetFileType
IsDBCSLeadByte
WriteConsoleOutputCharacterA
WriteConsoleA
ReadConsoleOutputAttribute
WriteConsoleOutputAttribute
ScrollConsoleScreenBufferW
GetLargestConsoleWindowSize
LoadLibraryExW
GetCurrentProcessId
OpenProcess
Sleep
SetConsoleActiveScreenBuffer
GetEnvironmentVariableA
GetConsoleCP
GetModuleHandleA
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCurrentProcess
TerminateProcess
SetConsoleCursorInfo
UnhandledExceptionFilter
SetConsoleMode
WriteFile
WaitForSingleObject
WriteConsoleInputW
ResetEvent
WriteConsoleW
lstrcpynW
LocalFree
SetConsoleTitleW
SetEvent
SetConsoleWindowInfo
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
GetEnvironmentVariableW
LocalAlloc
CloseHandle
GetLastError
CreateFileW
GetACP
SetEnvironmentVariableW
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
SetConsoleCursorPosition
WideCharToMultiByte
ReadConsoleW
WriteConsoleOutputW
ReadConsoleOutputW
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
FormatMessageW
GetThreadLocale
SetThreadLocale
user32
wsprintfW
GetMessageW
TranslateMessage
DispatchMessageW
RegisterClassW
CreateWindowExW
DefWindowProcW
KillTimer
SetWindowLongW
GetKeyboardType
DestroyWindow
VkKeyScanW
MessageBeep
SetRectEmpty
GetWindowLongW
PostMessageW
IsCharAlphaW
IsCharAlphaNumericW
LoadStringW
MapVirtualKeyW
wsock32
WSAStartup
WSACleanup
socket
bind
setsockopt
connect
closesocket
WSAAsyncSelect
recv
send
WSASetLastError
getservbyport
ntohs
gethostbyaddr
htonl
inet_addr
gethostbyname
WSAGetLastError
ioctlsocket
getservbyname
htons
security
AcquireCredentialsHandleW
QuerySecurityPackageInfoW
InitializeSecurityContextW
imm32
ImmGetContext
ImmSetCompositionFontW
ImmSetCompositionWindow
ImmReleaseContext
ole32
CoCreateInstanceEx
CoUninitialize
CoInitializeEx
gdi32
TranslateCharsetInfo
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE