Static task
static1
Behavioral task
behavioral1
Sample
Up.bat.vbs
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Up.bat.vbs
Resource
win10v2004-20220812-en
General
-
Target
DEC6A33B305C4BB6CF922C8DF14778A00FA36103284D5D52C845CC90B69B3422.zip
-
Size
367KB
-
MD5
9a1ff05a882c5d0e995e4080bd100915
-
SHA1
53c9c84b39170bbb1e5f8f688d6e9573aa345fe0
-
SHA256
dec6a33b305c4bb6cf922c8df14778a00fa36103284d5d52c845cc90b69b3422
-
SHA512
9b846bb3101ddaba7d16f7e6c4dc4a8684bcf8cc71efa7555e24f276f3c5e6a41237b0a751bdf00ab8a3c8386cb7fc755bfa93987aba29fa95d65bbeb78b0841
-
SSDEEP
6144:kEqwoeIcRkX3DQh6ESMbp/2TU2XcfYej000qnmIFY1HJMO7lqKDQZzSpRwVsxXy:kEyHcaXTQh6ES4Khhu00fnDYZJMIqMAL
Malware Config
Signatures
Files
-
DEC6A33B305C4BB6CF922C8DF14778A00FA36103284D5D52C845CC90B69B3422.zip.zip
Password: infected
-
Up.bat.exe windows x64
caee994f79d85e47c06e5fa9cdeae453
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegGetValueW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
RegQueryValueExW
kernel32
SetLastError
GetCurrentProcess
GetStdHandle
WriteFile
ExpandEnvironmentStringsW
SetThreadUILanguage
FindClose
CreateFileW
GetFileAttributesW
FormatMessageW
GetLastError
CloseHandle
WriteConsoleW
LocalFree
VerSetConditionMask
GetModuleHandleW
VerifyVersionInfoW
GetFileType
SetConsoleTitleW
IsWow64Process
SetErrorMode
GetProcAddress
CompareStringW
GetModuleHandleExW
LoadLibraryExW
MapViewOfFile
CreateFileMappingW
FreeLibrary
LoadResource
FindResourceExW
UnmapViewOfFile
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
FindFirstFileW
GetStartupInfoW
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
msvcrt
memset
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
_onexit
__dllonexit
_unlock
_lock
_commode
_fmode
__C_specific_handler
_initterm
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
_CxxThrowException
_callnewh
?what@exception@@UEBAPEBDXZ
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBDH@Z
malloc
wcsncmp
wcsrchr
free
_purecall
memcpy_s
_vsnwprintf
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
wcschr
memmove_s
__uncaught_exception
__CxxFrameHandler3
memcpy
atl
ord30
ole32
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
PropVariantClear
CoInitialize
CoInitializeEx
oleaut32
VariantClear
SafeArrayCreate
SysStringLen
SafeArrayPutElement
SysAllocString
SysFreeString
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Up.bat.exe.vbs