Behavioral task
behavioral1
Sample
cleanxp.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cleanxp.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
delete.cmd
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
delete.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
delxp.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
delxp.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
go.cmd
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
go.cmd
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
sleep.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
sleep.exe
Resource
win10v2004-20231215-en
General
-
Target
57439150a0147cd1d22805610fa04bae
-
Size
128KB
-
MD5
57439150a0147cd1d22805610fa04bae
-
SHA1
9435fc804bbef82825314d577850ee6680a73087
-
SHA256
15bc5d60182b3a2a9bd288b67998b68503d3a6776372ebc6351b14ac5f85a36c
-
SHA512
9961ec53d1cf6f81643738e73e82b56a7e29fa209a1e59b958699179ef529847c518ebe81e25f4ddd635f43b2daa60f72aa13ea37a159d43d2046169d2cff0d1
-
SSDEEP
3072:lgHyJZvhWhJ97DfroqHh/BJKP0XjsMm1rN93V+L8:rJvMJNopP0Gj3Vk8
Malware Config
Signatures
-
resource yara_rule static1/unpack001/cleanxp.exe upx -
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/cleanxp.exe unpack002/out.upx unpack001/delxp.exe unpack001/sleep.exe
Files
-
57439150a0147cd1d22805610fa04bae.rar
-
cleanxp.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.code Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 512B - Virtual size: 333B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
delete.cmd
-
delxp.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 10KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 12B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
go.cmd
-
sleep.exe.exe windows:4 windows x86 arch:x86
56673f495e3d7428d0f447688bcbb277
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
HeapReAlloc
TerminateProcess
HeapSize
GetOEMCP
GetCPInfo
LCMapStringW
GetModuleHandleA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
LCMapStringA
HeapFree
RaiseException
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
SetStdHandle
GetLocaleInfoW
GlobalAlloc
GlobalReAlloc
GlobalLock
LeaveCriticalSection
GlobalHandle
HeapAlloc
ExitProcess
GetCommandLineA
RtlUnwind
GlobalAddAtomA
GetVersionExA
GlobalFlags
lstrcmpA
MulDiv
GetModuleFileNameA
lstrcmpiA
lstrcpyA
LoadLibraryA
FreeLibrary
GetProcAddress
GlobalUnlock
HeapCreate
VirtualFree
Sleep
DeleteCriticalSection
GlobalFree
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
GetProcessVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
GetVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
VirtualAlloc
SetUnhandledExceptionFilter
HeapDestroy
TlsAlloc
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
lstrlenA
WideCharToMultiByte
InitializeCriticalSection
SetLastError
GetLastError
lstrcpynA
LocalAlloc
LocalFree
user32
DrawTextA
DestroyMenu
BeginPaint
EndPaint
GetActiveWindow
GrayStringA
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
GetNextDlgTabItem
TabbedTextOutA
EnableMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
EndDialog
PostQuitMessage
FindWindowA
InvalidateRect
CheckMenuItem
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
ReleaseCapture
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
IsIconic
BringWindowToTop
DispatchMessageA
GetFocus
SetActiveWindow
IsWindow
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
ScreenToClient
ScrollWindow
SetScrollInfo
ShowScrollBar
PeekMessageA
GetScrollPos
SetScrollPos
GetTopWindow
WinHelpA
wsprintfA
GetSubMenu
GetMenuItemID
GetMenu
GetKeyState
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
RegisterWindowMessageA
GetParent
SetFocus
IsWindowEnabled
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgCtrlID
GetWindowTextA
SetWindowTextA
GetWindowLongA
GetDlgItem
EnableWindow
SetCursor
ShowOwnedPopups
SendMessageA
UnhookWindowsHookEx
LoadStringA
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorA
GetSystemMetrics
LoadIconA
PostMessageA
UpdateWindow
SystemParametersInfoA
MapWindowPoints
GetSysColor
IsChild
GetCapture
SetScrollRange
RegisterClassA
GetClassInfoA
GetMenuItemCount
gdi32
SetTextColor
GetObjectA
GetDeviceCaps
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
SetBkColor
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
comctl32
ImageList_Destroy
ord17
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE