Behavioral task
behavioral1
Sample
4111db99c43e948009209f5a8d50484ae3ce96f7f194ffb3d8f77d077782f702.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4111db99c43e948009209f5a8d50484ae3ce96f7f194ffb3d8f77d077782f702.exe
Resource
win10v2004-20221111-en
General
-
Target
4111db99c43e948009209f5a8d50484ae3ce96f7f194ffb3d8f77d077782f702
-
Size
179KB
-
MD5
5a41d5c29a32b7457529cd5f250bae1c
-
SHA1
f76020be32b659ee5eec054f0724175233d1429b
-
SHA256
4111db99c43e948009209f5a8d50484ae3ce96f7f194ffb3d8f77d077782f702
-
SHA512
1aa0c84430a68c781ad40e441152d5d0e301e939a83ab49a1f2858d76a40884cdfe34d47d8075506aca759774cb6648d62d141c7877564736fe89fbaf0c0764d
-
SSDEEP
3072:DvbSG8qwSwqzpiMofspVr5SO6+dpfE0Q0mQBJ7yBVk7znQwOzzN4YWy1HT3dU8:Dvb78+zpiNf+1dpfElYyBVEE/WsTdU8
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
4111db99c43e948009209f5a8d50484ae3ce96f7f194ffb3d8f77d077782f702.exe windows x86
c3e401656599f4e7a7c60961e3c76381
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_cexit
_XcptFilter
_c_exit
_itow
_purecall
wcsncpy
_vsnwprintf
_putws
wcscpy
wcscat
wcschr
wcsrchr
_except_handler3
_snprintf
_wcsicmp
wcslen
_ltoa
wcscmp
_snwprintf
sprintf
strchr
strtoul
strncpy
calloc
free
??2@YAPAXI@Z
realloc
??3@YAXPAX@Z
_exit
wcsncat
_wsplitpath
malloc
advapi32
RegSetValueExW
RegisterEventSourceW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
DeregisterEventSource
ChangeServiceConfigW
RegCreateKeyW
SetServiceStatus
ControlService
DeleteService
CreateServiceW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CryptAcquireContextW
RegSetKeySecurity
GetSecurityDescriptorLength
MakeSelfRelativeSD
ReportEventW
LsaOpenPolicy
LsaQueryInformationPolicy
LsaFreeMemory
LsaClose
CryptReleaseContext
RegNotifyChangeKeyValue
AllocateAndInitializeSid
CryptGenRandom
FreeSid
RegDeleteValueW
SetSecurityDescriptorDacl
RegEnumKeyExW
LookupPrivilegeValueW
AdjustTokenPrivileges
EqualSid
RegDeleteKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
InitializeSecurityDescriptor
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
OpenProcessToken
GetAce
InitializeAcl
AddAccessAllowedAce
kernel32
WaitForMultipleObjects
SetErrorMode
InterlockedDecrement
GetSystemDirectoryW
GetACP
SetFilePointer
GetLocalTime
GetCommandLineW
Sleep
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
ExpandEnvironmentStringsW
GetConsoleCP
LocalAlloc
FormatMessageW
LocalFree
CreateMutexW
CreateNamedPipeW
HeapFree
HeapAlloc
GetProcessHeap
VirtualFree
VirtualAlloc
WriteFile
lstrlenW
lstrcpyW
GetLastError
InterlockedIncrement
lstrcmpiW
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
CloseHandle
GetCurrentProcess
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
lstrcatW
GetModuleFileNameW
lstrcpynW
FreeLibrary
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetFileSize
CreateFileW
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
CreateEventW
InterlockedExchange
ReleaseMutex
PostQueuedCompletionStatus
SetLastError
GetOEMCP
SetHandleInformation
CreateIoCompletionPort
CreateProcessW
ReadFile
OpenProcess
PeekNamedPipe
GetSystemTime
SetEvent
TerminateThread
GetVersionExW
GetQueuedCompletionStatus
CreateThread
DuplicateHandle
InterlockedCompareExchange
ResetEvent
user32
LoadStringW
CloseWindowStation
CloseDesktop
wsprintfW
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
OpenWindowStationW
GetProcessWindowStation
wsprintfA
LoadStringA
MessageBoxW
CharNextW
ntlsapi
NtLicenseRequestA
NtLSFreeHandle
ole32
CoInitializeSecurity
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoInitialize
CoInitializeEx
oleaut32
SysStringByteLen
SysStringLen
UnRegisterTypeLi
VarDateFromUdate
VarBstrFromDate
VarI4FromStr
LoadTypeLi
RegisterTypeLi
SetErrorInfo
LoadRegTypeLi
SysAllocStringLen
SysFreeString
ws2_32
WSASetEvent
WSACloseEvent
accept
shutdown
WSAResetEvent
WSADuplicateSocketW
getpeername
WSAStartup
WSACreateEvent
socket
setsockopt
bind
listen
WSAEventSelect
closesocket
WSASetLastError
WSAEnumNetworkEvents
getservbyport
ntohs
gethostbyaddr
htons
WSACleanup
getservbyname
htonl
inet_ntoa
gethostbyname
WSAGetLastError
inet_addr
psapi
EnumProcesses
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE