Behavioral task
behavioral1
Sample
9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0.exe
Resource
win10v2004-20240709-en
General
-
Target
9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0
-
Size
3.3MB
-
MD5
8ca55e334f4679e6aadc101833a19a38
-
SHA1
1b47cf80bfa6c7cb6f72fc0a1046e7ffa91b26a3
-
SHA256
9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0
-
SHA512
2ebfb891c70f544e1e886d2a98478cdae213323fdc6e741c0dc4082d929ff028fa2fbabe2bcab3f6e365085267da8b55d74af8142c994cf633752624b98e7892
-
SSDEEP
49152:m/CKxi03zDWi26fs2cWDAbcl7j1v4+9Ry4kjC+Fn05Ricx4PHzLbf:m/CKT0uDhVv4n4MbFn05Ricx4PHzLb
Malware Config
Signatures
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule sample unk_chinese_botnet -
Chinese_generic_botnet family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0
Files
-
9553e9d5c162ee6bc5ebe0461a87e5d9d1c66c5be38c3293050d87cf8d048ca0.exe windows:4 windows x86 arch:x86
8472290259d58812608e3184c0b77c35
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetACP
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
TerminateProcess
HeapFree
HeapAlloc
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetFileTime
GetFileSize
GetProcAddress
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetErrorMode
GetThreadLocale
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetLastError
GlobalFlags
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
SetLastError
CloseHandle
GetCurrentThread
FormatMessageA
LocalFree
GlobalReAlloc
GlobalAlloc
lstrcpynA
lstrcmpA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GetTickCount
GetModuleHandleA
VirtualFree
user32
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
LoadCursorA
PtInRect
GetClassNameA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
DestroyMenu
LoadStringA
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
SetCursor
PostQuitMessage
GetDesktopWindow
GetDC
ReleaseDC
wvsprintfA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
CopyRect
CharUpperA
RegisterClipboardFormatA
PostThreadMessageA
GetCursorPos
IsWindowVisible
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
LoadIconA
SendMessageA
EnableWindow
EnableMenuItem
UnregisterClassA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
LPtoDP
GetBkColor
GetTextColor
DPtoLP
SaveDC
GetWindowExtEx
GetViewportExtEx
GetDeviceCaps
DeleteObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
DeleteDC
GetMapMode
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
comctl32
ImageList_Destroy
ord17
odbc32
ord17
ord72
ord4
ord48
ord49
ord20
ord59
ord8
ord44
ord10
ord5
ord16
ord13
ord18
ord11
ord3
ord14
ord9
ord15
ord51
ord45
ord50
ord1
ord2
ord41
ord68
ord12
ord46
ord19
oledlg
ord8
ole32
OleUninitialize
OleInitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
olepro32
ord253
oleaut32
SysAllocStringByteLen
VariantTimeToSystemTime
SysStringLen
VariantChangeType
SysAllocString
VariantCopy
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 324KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
��H�u� Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE