Behavioral task
behavioral1
Sample
84089644191ac0e914ec9a5a103769ca1249c32faef730e2e6bfbcfd8c6308e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84089644191ac0e914ec9a5a103769ca1249c32faef730e2e6bfbcfd8c6308e2.exe
Resource
win10v2004-20221111-en
General
-
Target
84089644191ac0e914ec9a5a103769ca1249c32faef730e2e6bfbcfd8c6308e2
-
Size
118KB
-
MD5
4928a53e180cc0ccb757a4e38028e7f4
-
SHA1
cd5b8120e49f2d7f45ec03328e2438afba35be2e
-
SHA256
84089644191ac0e914ec9a5a103769ca1249c32faef730e2e6bfbcfd8c6308e2
-
SHA512
7a33848b31ef6f7976e55f811a953c96bc433de0441d41b2146d1053e0fc967302f39ed08bc4826aae75b09462f6fff35281f0ec1ef435a6fa68520bcb2a9d56
-
SSDEEP
1536:SBvHOEOrtKA5OPRHI2GbiI42yhP53J9l6FpwyaBZS0cKmf6WKO:SEEkOPRNI428BZ9l6r8TcF8
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
84089644191ac0e914ec9a5a103769ca1249c32faef730e2e6bfbcfd8c6308e2.exe windows x86
3df68c9973c4e6c5822bd0b5cf39de17
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcscmp
malloc
free
strstr
atoi
wcsrchr
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
memset
memcpy
_except_handler3
shlwapi
PathFileExistsA
SHDeleteKeyA
SHSetValueA
SHDeleteValueA
SHGetValueA
psapi
GetModuleFileNameExA
ws2_32
WSAGetLastError
bind
WSACreateEvent
WSAResetEvent
gethostname
WSAEventSelect
connect
inet_ntoa
htonl
setsockopt
send
WSAStartup
inet_addr
htons
shutdown
sendto
WSACleanup
socket
closesocket
gethostbyname
WSARecvFrom
iphlpapi
GetAdaptersInfo
mpr
WNetCancelConnection2A
WNetAddConnection2A
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
gdiplus
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
kernel32
lstrcpyW
CreateThread
lstrcmpiW
UnmapViewOfFile
CreateFileMappingA
MoveFileA
MapViewOfFile
VirtualProtect
lstrlenW
TerminateProcess
GetVolumeInformationA
GetCurrentProcess
SetFileAttributesA
TransactNamedPipe
GetLocalTime
WinExec
MoveFileExA
LoadResource
lstrcpynA
RemoveDirectoryA
CreateDirectoryA
GetFileAttributesA
ExitProcess
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
SetEndOfFile
FreeLibrary
WaitForSingleObject
SetEvent
GetModuleHandleW
VirtualFree
VirtualQueryEx
WriteFile
Sleep
CreateEventA
ReadFile
GetSystemDirectoryA
ExitThread
MultiByteToWideChar
lstrcmpiA
GetProcAddress
VirtualAlloc
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetTempPathA
DeleteFileA
lstrcpyA
FindResourceA
FreeResource
GetCurrentThreadId
Process32First
GetTickCount
GetSystemTimeAsFileTime
SetFileTime
GetDriveTypeA
OpenProcess
SizeofResource
GetExitCodeProcess
CreateProcessA
GetLastError
Process32Next
LockResource
DeviceIoControl
SetNamedPipeHandleState
LoadLibraryExA
CreateToolhelp32Snapshot
GetFileTime
GetVersionExA
LocalFree
WideCharToMultiByte
ConnectNamedPipe
TerminateThread
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
OpenThread
GetLogicalDrives
user32
ReleaseDC
GetDC
wsprintfA
PostMessageA
FindWindowA
wsprintfW
gdi32
CreateCompatibleBitmap
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
advapi32
SetNamedSecurityInfoA
QueryServiceStatus
OpenSCManagerA
ControlService
RegOpenKeyA
RegCloseKey
SetEntriesInAclA
BuildExplicitAccessWithNameA
CloseServiceHandle
OpenServiceW
RegSetValueExA
RegQueryValueExA
CreateServiceA
StartServiceA
RegCreateKeyExA
DuplicateTokenEx
CreateProcessAsUserA
AdjustTokenPrivileges
RegFlushKey
RegSaveKeyA
LookupPrivilegeValueA
RegRestoreKeyA
DeleteService
OpenProcessToken
OpenServiceA
GetNamedSecurityInfoA
RegOpenKeyExA
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE