Behavioral task
behavioral1
Sample
13e4bf821cd6c06bebd61346b776954935e2451f558e905c95b180319653b275.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13e4bf821cd6c06bebd61346b776954935e2451f558e905c95b180319653b275.exe
Resource
win10v2004-20220812-en
General
-
Target
13e4bf821cd6c06bebd61346b776954935e2451f558e905c95b180319653b275
-
Size
327KB
-
MD5
cc5a78ff2c6b7aa3c6d07618f0c76fe1
-
SHA1
ce1c4a16a3279ce2b64c04c7893c19f164225b7a
-
SHA256
13e4bf821cd6c06bebd61346b776954935e2451f558e905c95b180319653b275
-
SHA512
6c46ac406ab844e887957b3dba370512db1b81330ade1fbd997448278e1f5cfc8d49aab11f91a2884cb83aa28f7c259191b9e6594a6575f2311aafe5987394e2
-
SSDEEP
6144:ZL3Si2xLwgxYv/srWpAVs5uPD6h96PjcsmeReNDIJi8Z+BbR:WxLVMsCpn5K6hQLmeRYpQc
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
13e4bf821cd6c06bebd61346b776954935e2451f558e905c95b180319653b275.exe windows x86
059c8b5c9fcbb1ab63e14cae9688b3fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
free
wcscmp
wcsncmp
__CxxFrameHandler
??2@YAPAXI@Z
sprintf
strstr
swprintf
wcscat
??3@YAXPAX@Z
exit
wcsstr
wcslen
wcscpy
mbstowcs
_wcsupr
memmove
wcsrchr
towupper
wcsncpy
fclose
fflush
mbtowc
__mb_cur_max
fopen
wcschr
_c_exit
_exit
_XcptFilter
_cexit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
advapi32
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyW
InitiateSystemShutdownW
RegCreateKeyExW
RegSetValueExW
RegUnLoadKeyW
RegLoadKeyW
RegOpenKeyExW
RegQueryValueExW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegisterServiceCtrlHandlerW
LookupPrivilegeValueW
PrivilegeCheck
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
OpenThreadToken
OpenProcessToken
SetServiceStatus
StartServiceCtrlDispatcherW
RegDeleteKeyW
kernel32
FindClose
GetFileAttributesW
lstrlenA
InterlockedIncrement
ExitThread
GetProcAddress
FreeLibrary
TerminateThread
DeleteVolumeMountPointW
SetVolumeMountPointW
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
LoadLibraryW
ResumeThread
CreateFileA
LocalAlloc
GetComputerNameW
IsBadCodePtr
FindFirstFileW
lstrcpyA
IsBadWritePtr
GetSystemDirectoryW
GetComputerNameExW
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
SetEndOfFile
SetFilePointerEx
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
CompareStringW
GetCurrentThreadId
InterlockedDecrement
SetLastError
HeapAlloc
GetProcessHeap
HeapFree
QueryDosDeviceW
DeviceIoControl
CloseHandle
CreateFileW
DefineDosDeviceW
GetDriveTypeW
Sleep
LocalFree
GetLastError
lstrcmpiA
SetEvent
lstrcmpW
lstrlenW
FormatMessageW
GetModuleHandleW
CreateEventW
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentThread
CreateThread
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
IsBadStringPtrW
IsBadReadPtr
lstrcpyW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
lstrcatW
GetVolumePathNamesForVolumeNameW
user32
PostThreadMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassW
CreateWindowExW
ShowWindow
DefWindowProcW
BroadcastSystemMessageW
PostMessageW
DestroyWindow
wsprintfW
LoadStringW
PostQuitMessage
ntdll
NtFlushBuffersFile
NtDeviceIoControlFile
NtQueryVolumeInformationFile
NtQuerySystemTime
RtlAdjustPrivilege
RtlExtendedLargeIntegerDivide
NtQuerySystemInformation
RtlFreeUnicodeString
NtOpenFile
RtlCreateUnicodeString
NtFsControlFile
NtWriteFile
NtReadFile
NtDeleteBootEntry
NtTranslateFilePath
NtEnumerateBootEntries
NtModifyBootEntry
NtQuerySymbolicLinkObject
RtlExtendedIntegerMultiply
RtlInitUnicodeString
NtOpenSymbolicLinkObject
NtClose
ole32
CoSuspendClassObjects
CoRevertToSelf
CoImpersonateClient
CoTaskMemAlloc
CoSetProxyBlanket
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
rpcrt4
RpcServerUseProtseqEpW
RpcServerRegisterIf
RpcServerListen
RpcMgmtStopServerListening
RpcServerUnregisterIf
UuidFromStringW
UuidEqual
UuidCreate
RpcImpersonateClient
RpcRevertToSelf
NdrServerCall2
setupapi
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
CM_Locate_DevNodeW
CM_Get_Device_IDW
CM_Get_Device_ID_Size_Ex
CM_Get_DevNode_Status_Ex
SetupDiOpenDeviceInterfaceW
SetupDiCreateDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiOpenDeviceInfoW
CM_Get_Parent_Ex
CM_Get_Device_ID_List_ExW
CM_Get_Device_ID_List_Size_ExW
SetupDiEnumDeviceInterfaces
CM_Reenumerate_DevNode_Ex
clusapi
GetNodeClusterState
dmutil
AddEntryBootFileGpt
LowNtWriteFile
LowNtReadFile
LowNtReadOnlyAttributeOff
GetSystemVolume
GetInstallDirectoryPath
LowAcquirePrivilege
DynamicSupport
FreeRgszw
RgszwFromArgs
RgszwFromValist
RgszwDupRgszw
GetErrorData
AddEntryBootFileMbr
TranslateError
osuninst
IsUninstallImageValid
Sections
.text Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE