Behavioral task
behavioral1
Sample
d19ca2c156fd31f5a211949b1ae90dba5d9f52b4688bf806a2e8e3e2f83dd4c1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d19ca2c156fd31f5a211949b1ae90dba5d9f52b4688bf806a2e8e3e2f83dd4c1.exe
Resource
win10v2004-20220901-en
General
-
Target
d19ca2c156fd31f5a211949b1ae90dba5d9f52b4688bf806a2e8e3e2f83dd4c1
-
Size
222KB
-
MD5
fc5dcfb9fddcb90273bf14b3ffa5333d
-
SHA1
db1882e78df485ab1423986b349a159313106a26
-
SHA256
d19ca2c156fd31f5a211949b1ae90dba5d9f52b4688bf806a2e8e3e2f83dd4c1
-
SHA512
ffd45052c08b392a8da0275820858a80c94bab0b52a6c0d2fe44ac3a95b84da792eecf052e4a5beb09eba579dd0c11c8d0da8eb4178ea6eb79476d42d4176899
-
SSDEEP
6144:IUyui4gm1pM5hItQU2IXaHXtSRWKrraY:aVIX+XtSRWGr5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d19ca2c156fd31f5a211949b1ae90dba5d9f52b4688bf806a2e8e3e2f83dd4c1.exe windows x86
f4e4bebb6a382160d2b4c19febc4ca05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strlen
atoi
strstr
wcsrchr
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
memset
memcpy
_except_handler3
shlwapi
SHDeleteKeyA
SHDeleteValueA
PathFileExistsA
SHSetValueA
SHGetValueA
ws2_32
gethostname
WSAResetEvent
inet_addr
htons
WSAEventSelect
shutdown
setsockopt
socket
closesocket
sendto
WSAStartup
WSACleanup
gethostbyname
WSACreateEvent
bind
WSARecvFrom
WSAGetLastError
inet_ntoa
send
htonl
connect
iphlpapi
GetAdaptersInfo
wintrust
WinVerifyTrust
mpr
WNetAddConnection2A
WNetOpenEnumA
WNetEnumResourceA
WNetCancelConnection2A
WNetCloseEnum
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
GlobalFree
GetLocalTime
WinExec
MoveFileExA
GetLogicalDrives
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
FindFirstFileA
GetLogicalDriveStringsA
FindClose
WaitForMultipleObjects
GetExitCodeProcess
TransactNamedPipe
GlobalAlloc
lstrcpynA
CreateFileMappingA
UnmapViewOfFile
MapViewOfFile
SetFileAttributesA
CopyFileA
GetExitCodeThread
FlushViewOfFile
ExitProcess
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
VirtualQuery
SetEndOfFile
FreeLibrary
WaitForSingleObject
SetEvent
VirtualFree
WriteFile
Sleep
CreateEventA
ReadFile
GetSystemDirectoryA
ExitThread
MultiByteToWideChar
lstrcmpiA
GetProcAddress
VirtualAlloc
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetTempPathA
DeleteFileA
lstrcpyA
FindResourceA
FreeResource
LoadResource
Process32First
GetSystemTimeAsFileTime
SetFileTime
GetDriveTypeA
SizeofResource
GetTickCount
CreateProcessA
lstrcatA
GetLastError
Process32Next
LockResource
DeviceIoControl
SetNamedPipeHandleState
LoadLibraryExA
CreateToolhelp32Snapshot
GetFileTime
GetVersionExA
LocalFree
WideCharToMultiByte
ConnectNamedPipe
TerminateThread
Thread32Next
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
OpenThread
GetCurrentThreadId
GetCurrentProcess
OpenProcess
GetVolumeInformationA
TerminateProcess
lstrlenW
lstrcmpiW
VirtualProtect
lstrcpyW
CreateThread
FindNextFileA
user32
wsprintfA
PostMessageA
FindWindowA
wsprintfW
advapi32
DeleteService
RegCloseKey
CloseServiceHandle
OpenServiceW
RegSetValueExA
RegQueryValueExA
CreateServiceA
StartServiceA
RegCreateKeyExA
RegOpenKeyExA
QueryServiceStatus
OpenSCManagerA
ControlService
DuplicateTokenEx
CreateProcessAsUserA
AdjustTokenPrivileges
RegFlushKey
RegSaveKeyA
LookupPrivilegeValueA
RegRestoreKeyA
SetEntriesInAclA
OpenProcessToken
OpenServiceA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegOpenKeyA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE