Static task
static1
Behavioral task
behavioral1
Sample
821d57d8c4f9d1f10c3ac8a8a095b0b2d7fcb463991904f2012265ca6592e24c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
821d57d8c4f9d1f10c3ac8a8a095b0b2d7fcb463991904f2012265ca6592e24c.exe
Resource
win10v2004-20240226-en
General
-
Target
821d57d8c4f9d1f10c3ac8a8a095b0b2d7fcb463991904f2012265ca6592e24c.sample
-
Size
250KB
-
MD5
34b6a2858b32f25433101d72705f1421
-
SHA1
55e31f9c1ca8dd03cb924631d371d0fb5a08bf6a
-
SHA256
821d57d8c4f9d1f10c3ac8a8a095b0b2d7fcb463991904f2012265ca6592e24c
-
SHA512
18fa6de0d483036f52e7997494ee5da3a5a79f7f27be3e40fec630297f7be702a048a30caa3ddb0a0f8a026f49beceb94218243753f0599b862b9cf1ac94adce
-
SSDEEP
6144:qa0Y9MHhZhPMgjlBmXn1DxttmQIWqgYfI5CeDo:qoeNjrUn1tt/pqio
Malware Config
Signatures
-
Detects executables containing commands for clearing Windows Event Logs 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_ClearWinLogs -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 821d57d8c4f9d1f10c3ac8a8a095b0b2d7fcb463991904f2012265ca6592e24c.sample
Files
-
821d57d8c4f9d1f10c3ac8a8a095b0b2d7fcb463991904f2012265ca6592e24c.sample.exe windows:6 windows x86 arch:x86
aacd448f5c1aee3f14cb8d00004db14c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetLastError
GetNativeSystemInfo
ExitProcess
OpenMutexW
GetTickCount
FindFirstFileW
GetFileSizeEx
FindFirstVolumeW
FindNextFileW
WaitForMultipleObjects
SetThreadPriority
GetQueuedCompletionStatus
FindClose
GetFileAttributesW
ResumeThread
PostQueuedCompletionStatus
SetFileAttributesW
GetExitCodeThread
GetCurrentThread
GetSystemInfo
LoadLibraryW
CreateThread
SetVolumeMountPointW
SetFilePointerEx
MoveFileExW
FindVolumeClose
GetCurrentProcessId
SetThreadExecutionState
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
CreateIoCompletionPort
HeapCreate
HeapFree
HeapAlloc
GetProcessHeap
WideCharToMultiByte
CancelIo
CreateTimerQueueTimer
DeleteTimerQueue
CreateTimerQueue
LocalFree
ReleaseSemaphore
CreateSemaphoreW
DecodePointer
GetConsoleMode
GetConsoleOutputCP
ReleaseMutex
HeapSize
WaitForSingleObject
CreateMutexW
SetProcessShutdownParameters
TerminateProcess
SetPriorityClass
ReadFile
DeleteCriticalSection
GetLocalTime
lstrcatW
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
LCMapStringW
GetModuleFileNameW
WriteFile
EnterCriticalSection
lstrcmpiA
FindResourceW
LoadResource
LockResource
MultiByteToWideChar
SizeofResource
GetDriveTypeW
GetModuleHandleW
GetComputerNameW
GetProcAddress
CloseHandle
GetDiskFreeSpaceExW
lstrlenA
GetCommandLineW
GetCurrentProcess
GetLogicalDrives
lstrcmpiW
lstrcpyW
lstrlenW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapReAlloc
GetFileType
GetModuleHandleExW
GetStdHandle
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
SetLastError
RaiseException
RtlUnwind
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
OpenProcess
FlushFileBuffers
WriteConsoleW
user32
GetDC
DrawTextW
SystemParametersInfoW
ReleaseDC
wsprintfW
gdi32
SetBkColor
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
CreateFontW
GetDIBits
GetDeviceCaps
DeleteDC
GetTextExtentPoint32W
SetTextColor
SetBkMode
DeleteObject
winspool.drv
OpenPrinterW
ClosePrinter
StartPagePrinter
EnumPrintersW
StartDocPrinterW
WritePrinter
advapi32
DuplicateToken
GetTokenInformation
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
SetThreadToken
RegCloseKey
CloseServiceHandle
OpenSCManagerW
RegCreateKeyExW
DeleteService
ControlService
EnumDependentServicesW
RegSetValueExW
RegOpenKeyExW
OpenServiceW
QueryServiceStatusEx
RegQueryValueExW
OpenProcessToken
GetUserNameW
shell32
SHEmptyRecycleBinW
SHGetFolderPathW
ShellExecuteW
SHChangeNotify
CommandLineToArgvW
ole32
CoUninitialize
CoSetProxyBlanket
CoInitialize
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
rstrtmgr
RmStartSession
RmEndSession
RmGetList
RmRegisterResources
netapi32
NetGetJoinInformation
NetApiBufferFree
NetShareEnum
ws2_32
WSAStartup
WSACleanup
socket
WSAAddressToStringW
getsockopt
htonl
WSASocketW
shutdown
ntohl
closesocket
WSAIoctl
bind
inet_addr
htons
setsockopt
WSAGetLastError
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetOpenW
InternetOpenUrlW
HttpOpenRequestW
HttpSendRequestW
shlwapi
PathRemoveExtensionW
PathRemoveFileSpecW
StrRChrW
PathAddBackslashW
StrStrIW
PathFindExtensionW
ntdll
NtQuerySystemInformation
RtlRandomEx
NtShutdownSystem
RtlAdjustPrivilege
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ