Behavioral task
behavioral1
Sample
e4a107ad4da57865e1f6ae2aca4b583d2b5af6d6fc339875aea6aa2036bd0a18.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4a107ad4da57865e1f6ae2aca4b583d2b5af6d6fc339875aea6aa2036bd0a18.exe
Resource
win10v2004-20220812-en
General
-
Target
e4a107ad4da57865e1f6ae2aca4b583d2b5af6d6fc339875aea6aa2036bd0a18
-
Size
952KB
-
MD5
c0da389f251c8999145ac74a5623b953
-
SHA1
8c13c232d90d8cce78b289794ca816ebe11dfdf7
-
SHA256
e4a107ad4da57865e1f6ae2aca4b583d2b5af6d6fc339875aea6aa2036bd0a18
-
SHA512
14c875f80a0856eb1b7e22aa78a0a3e44b505ec5a126df171a0193c4568d1665efc22191fcfbb903822c4a73bd09b9f458bfa21da49483b746165a8c8c8788f5
-
SSDEEP
12288:oyELQDEI04EAihYHfXDc3pW0MIVABeTQLvGIUgm0mVd9Z:9ELQpYac3pW0P6Be0L+9gm0GdH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e4a107ad4da57865e1f6ae2aca4b583d2b5af6d6fc339875aea6aa2036bd0a18.exe windows x86
4dc2a7c6d3f72ba8b25e4166769b2424
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_wcsnicmp
strncmp
memcpy
RtlInitUnicodeString
RtlInitString
memset
kernel32
HeapFree
HeapAlloc
HeapSize
GetProcessHeap
Sleep
HeapSetInformation
GetVersionExW
GetVolumeInformationW
GetCurrentProcess
OutputDebugStringW
IsDebuggerPresent
DebugBreak
FatalExit
LoadLibraryW
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedCompareExchange
SetLastError
AssignProcessToJobObject
CreateJobObjectW
IsProcessorFeaturePresent
GetSystemDirectoryW
ResumeThread
TerminateProcess
WaitForMultipleObjects
ProcessIdToSessionId
OpenProcess
LocalFree
LocalAlloc
FreeLibrary
CreateFileW
GetFileType
CloseHandle
HeapDestroy
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetLastError
GetCurrentProcessId
InterlockedExchange
HeapReAlloc
GetCurrentThreadId
rpcrt4
NdrServerCall2
RpcStringFreeW
RpcBindingFree
I_RpcBindingInqLocalClientPID
RpcStringBindingParseW
RpcRevertToSelf
RpcImpersonateClient
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcBindingSetAuthInfoW
RpcBindingToStringBindingW
RpcBindingServerFromClient
RpcServerListen
RpcServerRegisterAuthInfoW
RpcServerRegisterIf2
NdrClientCall2
RpcMgmtStopServerListening
RpcServerUseProtseqEpW
advapi32
RevertToSelf
InitializeAcl
ConvertSidToStringSidW
GetSecurityInfo
SetEntriesInAclW
GetAclInformation
GetSecurityDescriptorControl
MakeAbsoluteSD
LookupPrivilegeValueW
GetTokenInformation
AdjustTokenPrivileges
SystemFunction036
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserW
ImpersonateLoggedOnUser
LsaNtStatusToWinError
SetTokenInformation
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
CopySid
IsValidSid
GetLengthSid
AllocateLocallyUniqueId
AllocateAndInitializeSid
FreeSid
GetSecurityDescriptorLength
MakeSelfRelativeSD
InitializeSecurityDescriptor
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
SetSecurityInfo
CreateWellKnownSid
EqualSid
CheckTokenMembership
ConvertStringSidToSidW
GetSecurityDescriptorSacl
AddAce
user32
MessageBoxW
msvcr80
??0exception@std@@QAE@ABV01@@Z
calloc
_except_handler4_common
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
__winitenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
??2@YAPAXI@Z
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
memmove_s
memcpy_s
_CxxThrowException
_vsnwprintf_s
_purecall
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
__p__commode
??0exception@std@@QAE@ABQBD@Z
??3@YAXPAX@Z
__CxxFrameHandler3
malloc
free
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
??0exception@std@@QAE@XZ
__FrameUnwindFilter
crypt32
CryptFindOIDInfo
CryptDecodeObject
CertGetCertificateContextProperty
CertVerifyCertificateChainPolicy
msvcp80
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
userenv
UnloadUserProfile
DestroyEnvironmentBlock
CreateEnvironmentBlock
LoadUserProfileW
secur32
LsaConnectUntrusted
LsaLookupAuthenticationPackage
LsaGetLogonSessionData
LsaFreeReturnBuffer
LsaDeregisterLogonProcess
LsaLogonUser
shlwapi
PathCombineW
msvcm80
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
shell32
SHGetFolderPathW
mscoree
_CorExeMain
Sections
.text Size: 244KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 508KB - Virtual size: 506KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE