Behavioral task
behavioral1
Sample
f4d11e1d59d067e850a910d0100fa0f0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f4d11e1d59d067e850a910d0100fa0f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f4d11e1d59d067e850a910d0100fa0f0N.exe
-
Size
772KB
-
MD5
f4d11e1d59d067e850a910d0100fa0f0
-
SHA1
d75243d473ef0aea05d1d49d9fe0679f16ccf218
-
SHA256
fc88110016788b8ee65c2c29c6e9fe77132719c0c4d5e0a9a4e2f97bc5f2c0f2
-
SHA512
a688af0d16856ce4e030af714fb61d60fa4f893df97895cd0807e29050d5fb128beb6e7b3a66a83f0405800435c31dfe3023da695ea487c4b82b022ddb2b20fe
-
SSDEEP
12288:LSX+EvrCA3FNIs34Zk1L1ZSNlm3Spsal6lbRtMuStGKcsCSqcl90VasgWP:kFNN4Zk1LTclm3e1kbRtyGKcpHcl5hWP
Malware Config
Signatures
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule sample family_ammyyadmin -
Ammyyadmin family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f4d11e1d59d067e850a910d0100fa0f0N.exe
Files
-
f4d11e1d59d067e850a910d0100fa0f0N.exe.exe windows:4 windows x86 arch:x86
f97ad1acd1ab75d2d973b655b2e7f9b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAGetLastError
send
recv
select
WSAStartup
getpeername
getservbyport
ntohs
gethostbyaddr
gethostbyname
inet_addr
getservbyname
htonl
inet_ntoa
WSAIoctl
connect
accept
htons
bind
listen
socket
__WSAFDIsSet
shutdown
setsockopt
ioctlsocket
WSACleanup
closesocket
gdi32
SetStretchBltMode
LineTo
MoveToEx
Ellipse
GetDIBits
CreateCompatibleBitmap
RealizePalette
SelectPalette
CreatePalette
GetSystemPaletteEntries
GdiFlush
CombineRgn
StretchBlt
CreateDIBitmap
DeleteDC
SetBkMode
SelectObject
CreateCompatibleDC
CreatePatternBrush
GetBitmapBits
GetObjectA
BitBlt
CreateFontIndirectA
DPtoLP
CreateRectRgn
ExtTextOutA
CreateDIBSection
SetBitmapBits
CreateRectRgnIndirect
SelectClipRgn
TextOutW
SetTextAlign
SetBrushOrgEx
ExtTextOutW
SetTextColor
SetBkColor
GetTextExtentPoint32W
CreateFontA
CreateFontIndirectW
GetStockObject
GetRegionData
CreateSolidBrush
DeleteObject
GetDeviceCaps
user32
FindWindowA
OpenDesktopA
SendMessageTimeoutA
IntersectRect
LoadIconA
EqualRect
EnumDisplaySettingsExW
EnumDisplayDevicesW
GetCursorInfo
OpenInputDesktop
CloseDesktop
GetUserObjectInformationA
GetThreadDesktop
EmptyClipboard
RegisterClassExA
PeekMessageA
MsgWaitForMultipleObjects
MapVirtualKeyW
SendInput
LockWorkStation
SetThreadDesktop
SetDlgItemTextA
SetDlgItemInt
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
DestroyAcceleratorTable
TranslateAcceleratorA
CreateAcceleratorTableA
SetWindowTextA
ReleaseCapture
SetCapture
GetAsyncKeyState
RegisterClassExW
DestroyCursor
MessageBeep
SetClipboardData
IsWindowVisible
SwitchToThisWindow
SendMessageA
FindWindowW
MessageBoxA
ShowWindow
wsprintfA
wsprintfW
SetCursorPos
GetClipboardOwner
OpenClipboard
GetClipboardData
CloseClipboard
ShowWindowAsync
GetWindowDC
SetScrollInfo
GetWindow
WindowFromPoint
SetClassLongW
ChangeClipboardChain
ReleaseDC
GetDC
DestroyIcon
LoadImageA
GetIconInfo
EnableWindow
SetDlgItemTextW
DestroyWindow
SetWindowPos
MapWindowPoints
InsertMenuItemW
InsertMenuItemA
EnumWindows
GetClassNameA
GetWindowTextA
KillTimer
GetWindowLongW
PostMessageA
DrawTextW
SetRect
ShowScrollBar
IsIconic
ScrollWindowEx
AdjustWindowRectEx
GetMenuState
GetWindowPlacement
SetWindowPlacement
GetSysColorBrush
AppendMenuW
SetClipboardViewer
DrawTextA
EndDialog
CreateDialogParamW
DialogBoxParamA
CallWindowProcW
CallWindowProcA
DefWindowProcA
IsWindowUnicode
GetSystemMenu
RedrawWindow
ScreenToClient
DrawStateA
DrawEdge
GetClientRect
CreateWindowExA
IsWindow
GetParent
GetWindowLongA
MonitorFromWindow
GetMonitorInfoW
EnumDisplaySettingsW
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetActiveWindow
SetCursor
SetTimer
PostThreadMessageA
MoveWindow
BeginPaint
EndPaint
GetDlgItemInt
SendDlgItemMessageA
MapDialogRect
SetWindowLongA
ClientToScreen
LoadCursorA
RegisterClassW
CreateWindowExW
SetWindowLongW
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SetWindowTextW
SetMenu
LoadMenuA
GetMenuItemInfoA
SetMenuItemInfoA
GetSubMenu
SetMenuItemInfoW
GetMenuItemID
EnableMenuItem
GetMenuItemCount
CheckMenuItem
GetKeyState
InvalidateRect
UpdateWindow
SetForegroundWindow
SetFocus
GetFocus
PostQuitMessage
DefWindowProcW
CreatePopupMenu
GetCursorPos
TrackPopupMenu
GetSysColor
GetSystemMetrics
GetMenuItemInfoW
DrawMenuBar
AppendMenuA
SystemParametersInfoW
DestroyMenu
GetDlgItem
MessageBoxW
SendMessageW
GetWindowRect
SystemParametersInfoA
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
Shell_NotifyIconA
SHGetFolderPathW
ShellExecuteExW
SHGetFileInfoW
SHGetFolderPathA
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteA
msvcrt
_strnicmp
_strupr
_strlwr
_wcsicmp
strchr
_controlfp
_iob
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
__CxxFrameHandler
strlen
isspace
memchr
_errno
strtol
isdigit
strstr
memcpy
??2@YAPAXI@Z
_purecall
free
memset
malloc
sprintf
printf
fwrite
srand
time
_CxxThrowException
rand
atol
_stricmp
isprint
tolower
strncpy
wcslen
atoi
abs
wcscpy
strcmp
strcpy
memcmp
iswspace
wcsncmp
_wtoi
_ultow
wcschr
_stat
swprintf
_ftol
strcat
strtoul
calloc
_rotl
_rotr
fopen
fread
fclose
fseek
ftell
fflush
wcsncpy
wcsrchr
vsprintf
vswprintf
memmove
strrchr
strncmp
mbstowcs
wcscmp
wcsstr
iswdigit
_beginthreadex
_endthreadex
cos
floor
sin
atof
_i64tow
wcscat
realloc
exit
fprintf
sscanf
getenv
fputc
_CIpow
_CIacos
??1type_info@@UAE@XZ
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_exit
_XcptFilter
secur32
FreeCredentialsHandle
InitializeSecurityContextA
CompleteAuthToken
FreeContextBuffer
AcquireCredentialsHandleA
QuerySecurityPackageInfoA
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiClassGuidsFromNameA
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsA
iphlpapi
GetAdaptersInfo
advapi32
ConvertSidToStringSidA
GetTokenInformation
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
FreeSid
SetFileSecurityW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
ImpersonateLoggedOnUser
RevertToSelf
GetUserNameA
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExA
SetServiceStatus
SetTokenInformation
DuplicateTokenEx
CreateProcessAsUserW
QueryServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
CreateServiceW
DeleteService
ControlService
StartServiceA
StartServiceW
RegCreateKeyExA
RegQueryValueExW
RegSetValueExW
RegSetValueExA
RegDeleteKeyA
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
SetEntriesInAclA
shlwapi
PathGetDriveNumberA
comdlg32
GetOpenFileNameW
GetSaveFileNameW
userenv
LoadUserProfileA
UnloadUserProfile
comctl32
CreateToolbarEx
ImageList_Create
ImageList_Draw
ImageList_Destroy
ord17
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Add
ImageList_Duplicate
_TrackMouseEvent
CreatePropertySheetPageW
PropertySheetW
wininet
HttpSendRequestA
HttpQueryInfoA
InternetConnectA
InternetSetOptionA
InternetCloseHandle
InternetReadFile
InternetOpenA
HttpOpenRequestA
dsound
ord7
ord6
ord2
ord1
kernel32
SizeofResource
LoadResource
LockResource
GetLocalTime
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetFileTime
GetFileTime
OpenMutexA
CreateMutexA
FindResourceExA
SetEvent
OpenEventA
CreateEventA
ExitProcess
SetUnhandledExceptionFilter
GetSystemDirectoryA
CompareFileTime
GetSystemTimeAsFileTime
GetSystemDirectoryW
lstrcatW
FileTimeToSystemTime
WaitNamedPipeW
ReadFile
SetLastError
GetExitCodeProcess
WaitForSingleObject
BeginUpdateResourceW
EndUpdateResourceW
UpdateResourceA
CreateThread
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
LoadLibraryA
FreeLibrary
GetFileSize
SetFilePointer
WriteFile
GetFileAttributesW
lstrcmpiW
lstrcmpW
MulDiv
FormatMessageW
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
GetComputerNameA
LocalAlloc
GetExitCodeThread
SystemTimeToFileTime
MoveFileW
DeleteFileW
GetTempPathW
CreateFileW
FindFirstFileW
FindClose
CreateFileA
DeviceIoControl
GetUserDefaultUILanguage
GetLocaleInfoA
CreateDirectoryW
SetCurrentDirectoryW
GetStartupInfoW
CreateProcessW
GetModuleHandleA
GetProcAddress
SetProcessShutdownParameters
GetVersionExA
GetCurrentProcess
GetLastError
CloseHandle
LocalFree
GetCurrentThreadId
GetCurrentProcessId
Sleep
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrlenW
TerminateProcess
GlobalUnlock
GlobalLock
SystemTimeToTzSpecificLocalTime
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
GlobalAlloc
GetDriveTypeW
RemoveDirectoryW
FindNextFileW
SetFileAttributesW
GetLogicalDrives
ProcessIdToSessionId
SleepEx
CreateDirectoryA
DeleteFileA
GlobalFree
IsBadReadPtr
lstrcmpA
LocalFileTimeToFileTime
LoadLibraryW
lstrcpyA
GetCurrentDirectoryA
FindResourceA
DuplicateHandle
CreateSemaphoreA
SetThreadPriority
TlsSetValue
GetCurrentThread
TlsAlloc
ResumeThread
TlsGetValue
InterlockedExchange
GetStartupInfoA
ResetEvent
Sections
.text Size: 540KB - Virtual size: 538KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ