Behavioral task
behavioral1
Sample
d44a89e7e3440e5981baa123774c5a6c4f8e5a4b68b97ea83252d183e7549937.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d44a89e7e3440e5981baa123774c5a6c4f8e5a4b68b97ea83252d183e7549937.exe
Resource
win10v2004-20221111-en
General
-
Target
d44a89e7e3440e5981baa123774c5a6c4f8e5a4b68b97ea83252d183e7549937
-
Size
215KB
-
MD5
cd0ca80b7e72e53f3fc41f440108e2a9
-
SHA1
0a6f5250b3a16c4c36dd47f7724e5c9670822200
-
SHA256
d44a89e7e3440e5981baa123774c5a6c4f8e5a4b68b97ea83252d183e7549937
-
SHA512
2e14440d39a4fec67753d1a44d3bea826a7bf88beec9fada33879009aa9f328e60749c6d3f957b13f5a028db189afeade89efb7be222737e113a19274f004c64
-
SSDEEP
6144:Wb78+zsiRFmRrCcCInKF/h1sIC9M/auOo1+38ZlPgvqr3IKJR6x8YcQxsKdsz+:+fIwW+BQKsTmOYEex6g3Xc2Yck
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d44a89e7e3440e5981baa123774c5a6c4f8e5a4b68b97ea83252d183e7549937.exe windows x86
c3e401656599f4e7a7c60961e3c76381
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_cexit
_XcptFilter
_c_exit
_itow
_purecall
wcsncpy
_vsnwprintf
_putws
wcscpy
wcscat
wcschr
wcsrchr
_except_handler3
_snprintf
_wcsicmp
wcslen
_ltoa
wcscmp
_snwprintf
sprintf
strchr
strtoul
strncpy
calloc
free
??2@YAPAXI@Z
realloc
??3@YAXPAX@Z
_exit
wcsncat
_wsplitpath
malloc
advapi32
RegSetValueExW
RegisterEventSourceW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
DeregisterEventSource
ChangeServiceConfigW
RegCreateKeyW
SetServiceStatus
ControlService
DeleteService
CreateServiceW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CryptAcquireContextW
RegSetKeySecurity
GetSecurityDescriptorLength
MakeSelfRelativeSD
ReportEventW
LsaOpenPolicy
LsaQueryInformationPolicy
LsaFreeMemory
LsaClose
CryptReleaseContext
RegNotifyChangeKeyValue
AllocateAndInitializeSid
CryptGenRandom
FreeSid
RegDeleteValueW
SetSecurityDescriptorDacl
RegEnumKeyExW
LookupPrivilegeValueW
AdjustTokenPrivileges
EqualSid
RegDeleteKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
InitializeSecurityDescriptor
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
OpenProcessToken
GetAce
InitializeAcl
AddAccessAllowedAce
kernel32
WaitForMultipleObjects
SetErrorMode
InterlockedDecrement
GetSystemDirectoryW
GetACP
SetFilePointer
GetLocalTime
GetCommandLineW
Sleep
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
ExpandEnvironmentStringsW
GetConsoleCP
LocalAlloc
FormatMessageW
LocalFree
CreateMutexW
CreateNamedPipeW
HeapFree
HeapAlloc
GetProcessHeap
VirtualFree
VirtualAlloc
WriteFile
lstrlenW
lstrcpyW
GetLastError
InterlockedIncrement
lstrcmpiW
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
CloseHandle
GetCurrentProcess
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
lstrcatW
GetModuleFileNameW
lstrcpynW
FreeLibrary
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetFileSize
CreateFileW
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
CreateEventW
InterlockedExchange
ReleaseMutex
PostQueuedCompletionStatus
SetLastError
GetOEMCP
SetHandleInformation
CreateIoCompletionPort
CreateProcessW
ReadFile
OpenProcess
PeekNamedPipe
GetSystemTime
SetEvent
TerminateThread
GetVersionExW
GetQueuedCompletionStatus
CreateThread
DuplicateHandle
InterlockedCompareExchange
ResetEvent
user32
LoadStringW
CloseWindowStation
CloseDesktop
wsprintfW
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
OpenWindowStationW
GetProcessWindowStation
wsprintfA
LoadStringA
MessageBoxW
CharNextW
ntlsapi
NtLicenseRequestA
NtLSFreeHandle
ole32
CoInitializeSecurity
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoInitialize
CoInitializeEx
oleaut32
SysStringByteLen
SysStringLen
UnRegisterTypeLi
VarDateFromUdate
VarBstrFromDate
VarI4FromStr
LoadTypeLi
RegisterTypeLi
SetErrorInfo
LoadRegTypeLi
SysAllocStringLen
SysFreeString
ws2_32
WSASetEvent
WSACloseEvent
accept
shutdown
WSAResetEvent
WSADuplicateSocketW
getpeername
WSAStartup
WSACreateEvent
socket
setsockopt
bind
listen
WSAEventSelect
closesocket
WSASetLastError
WSAEnumNetworkEvents
getservbyport
ntohs
gethostbyaddr
htons
WSACleanup
getservbyname
htonl
inet_ntoa
gethostbyname
WSAGetLastError
inet_addr
psapi
EnumProcesses
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE