Behavioral task
behavioral1
Sample
0498fcaffbcc80f86c8a6cb1ef655b9713bd96e2d08af2468570d087caa53ff7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0498fcaffbcc80f86c8a6cb1ef655b9713bd96e2d08af2468570d087caa53ff7.exe
Resource
win10v2004-20241007-en
General
-
Target
0498fcaffbcc80f86c8a6cb1ef655b9713bd96e2d08af2468570d087caa53ff7.exe
-
Size
792KB
-
MD5
69a8ed0b8edc940968f8535c20b4bbe4
-
SHA1
3557d87e895d994b7099c428b20f9088475194b5
-
SHA256
0498fcaffbcc80f86c8a6cb1ef655b9713bd96e2d08af2468570d087caa53ff7
-
SHA512
2e9f95743410ed2b98a022bd40f3a3bc126312a298cac7ef3dca5ce26126d4cc70c706798cabf11f1389da2605d584755872a0ad6f1ed6f210ed178b846c65da
-
SSDEEP
24576:uGFJJ/K/F/kpt3X8je6GrHtzRtO7GvmDgezU:uGTJ/o/u8jefyl3A
Malware Config
Signatures
-
AmmyyAdmin payload 1 IoCs
resource yara_rule sample family_ammyyadmin -
Ammyyadmin family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0498fcaffbcc80f86c8a6cb1ef655b9713bd96e2d08af2468570d087caa53ff7.exe
Files
-
0498fcaffbcc80f86c8a6cb1ef655b9713bd96e2d08af2468570d087caa53ff7.exe.exe windows:4 windows x86 arch:x86
3e985254f2e34ad96da799a2a5d33efe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAGetLastError
send
recv
select
WSAStartup
getpeername
getservbyport
ntohs
gethostbyaddr
gethostbyname
inet_addr
getservbyname
htonl
inet_ntoa
WSAIoctl
connect
accept
htons
bind
listen
socket
__WSAFDIsSet
shutdown
setsockopt
ioctlsocket
WSACleanup
closesocket
gdi32
SetStretchBltMode
LineTo
MoveToEx
Ellipse
GetDIBits
CreateCompatibleBitmap
RealizePalette
SelectPalette
CreatePalette
GetSystemPaletteEntries
GdiFlush
CombineRgn
GetRegionData
StretchBlt
GetTextExtentPoint32A
TextOutA
CreateDIBitmap
DeleteDC
SetBkMode
SelectObject
CreateCompatibleDC
CreatePatternBrush
BitBlt
CreateFontIndirectA
DPtoLP
GetDeviceCaps
GetBitmapBits
CreateRectRgn
ExtTextOutA
CreateDIBSection
CreateRectRgnIndirect
SelectClipRgn
TextOutW
SetTextAlign
SetBrushOrgEx
ExtTextOutW
SetTextColor
SetBkColor
GetTextExtentPoint32W
CreateFontA
CreateFontIndirectW
GetStockObject
CreatePen
CreateSolidBrush
DeleteObject
GetObjectA
user32
FillRect
LoadIconA
DrawIconEx
UnregisterClassW
FindWindowA
SendMessageTimeoutA
IntersectRect
IsWindowVisible
EqualRect
EnumDisplaySettingsExW
EnumDisplayDevicesW
GetCursorInfo
OpenInputDesktop
CloseDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
GetClipboardData
OpenClipboard
EmptyClipboard
CloseClipboard
SetClipboardData
RegisterClassExA
PeekMessageA
MapVirtualKeyW
SendInput
LockWorkStation
SetDlgItemTextA
SetDlgItemInt
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
DestroyAcceleratorTable
TranslateAcceleratorA
CreateAcceleratorTableA
SetWindowTextA
ReleaseCapture
SetCapture
GetAsyncKeyState
RegisterClassExW
DestroyCursor
MessageBeep
wsprintfW
DispatchMessageW
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjects
SetThreadDesktop
SwitchToThisWindow
SetCursorPos
ShowWindowAsync
GetClipboardOwner
GetWindowDC
SetScrollInfo
GetWindow
WindowFromPoint
CreateCursor
SetClassLongW
ChangeClipboardChain
MapWindowPoints
EnumWindows
GetClassNameA
SendMessageA
FindWindowW
MessageBoxW
MessageBoxA
ShowWindow
wsprintfA
ReleaseDC
GetDC
DestroyIcon
GetWindowTextA
KillTimer
GetWindowLongW
PostMessageA
DrawTextW
SetRect
ShowScrollBar
IsIconic
ScrollWindowEx
AdjustWindowRectEx
GetMenuState
GetWindowPlacement
SetWindowPlacement
GetSysColorBrush
SetClipboardViewer
DrawTextA
EndDialog
CreateDialogIndirectParamW
DialogBoxIndirectParamW
CallWindowProcW
CallWindowProcA
DefWindowProcA
IsWindowUnicode
GetSystemMenu
RedrawWindow
ScreenToClient
DrawStateA
DrawEdge
GetClientRect
CreateWindowExA
IsWindow
GetParent
GetWindowLongA
MonitorFromWindow
GetMonitorInfoW
EnumDisplaySettingsW
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetActiveWindow
SetCursor
SetTimer
PostThreadMessageA
MoveWindow
BeginPaint
EndPaint
GetDlgItemInt
SendDlgItemMessageA
MapDialogRect
SetWindowLongA
ClientToScreen
LoadCursorA
RegisterClassW
CreateWindowExW
SetWindowLongW
GetMessageA
IsDialogMessageA
DispatchMessageA
SetWindowTextW
SetMenu
InsertMenuItemW
AppendMenuW
InsertMenuItemA
CreateMenu
GetMenuItemInfoA
SetMenuItemInfoA
GetMenuItemID
EnableMenuItem
GetMenuItemCount
CheckMenuItem
GetKeyState
InvalidateRect
UpdateWindow
SetForegroundWindow
SetFocus
GetFocus
PostQuitMessage
DefWindowProcW
CreatePopupMenu
GetCursorPos
TrackPopupMenu
GetSysColor
GetSystemMetrics
GetMenuItemInfoW
DrawMenuBar
AppendMenuA
SystemParametersInfoW
DestroyMenu
GetDlgItem
SendMessageW
GetWindowRect
SystemParametersInfoA
SetWindowPos
DestroyWindow
SetDlgItemTextW
EnableWindow
GetIconInfo
LoadImageA
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
Shell_NotifyIconA
SHGetMalloc
SHGetFolderPathW
SHGetFolderPathA
ord680
ShellExecuteExW
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteA
msvcrt
_strnicmp
_strupr
_strlwr
_wcsicmp
wcsncmp
_controlfp
_iob
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
__CxxFrameHandler
strlen
isspace
memchr
_errno
strtol
isdigit
strstr
memcpy
??2@YAPAXI@Z
_purecall
free
memset
malloc
sprintf
printf
fwrite
srand
time
_CxxThrowException
rand
atol
memcmp
isprint
tolower
strncpy
_stricmp
wcslen
atoi
abs
wcscpy
strcmp
strcpy
iswspace
_stat
_wtoi
_ultow
wcschr
strchr
swprintf
_ftol
strcat
strtoul
calloc
_rotl
_rotr
fopen
fread
fclose
fseek
ftell
fflush
wcsncpy
wcsrchr
vsprintf
memmove
strrchr
strncmp
mbstowcs
wcscmp
wcsstr
vswprintf
iswdigit
_beginthreadex
_endthreadex
cos
floor
sin
atof
_i64tow
wcscat
realloc
_snwprintf
exit
fprintf
sscanf
getenv
fputc
_CIpow
_CIacos
??1type_info@@UAE@XZ
secur32
FreeCredentialsHandle
InitializeSecurityContextA
CompleteAuthToken
QuerySecurityPackageInfoA
AcquireCredentialsHandleA
FreeContextBuffer
shlwapi
PathGetDriveNumberA
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiClassGuidsFromNameA
SetupDiDestroyDeviceInfoList
iphlpapi
GetAdaptersInfo
advapi32
ConvertSidToStringSidA
GetTokenInformation
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
FreeSid
SetFileSecurityW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
ImpersonateLoggedOnUser
RevertToSelf
GetUserNameA
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExA
SetServiceStatus
SetTokenInformation
DuplicateTokenEx
CreateProcessAsUserW
QueryServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
CreateServiceW
DeleteService
ControlService
StartServiceA
StartServiceW
RegCreateKeyExA
RegQueryValueExW
RegSetValueExW
RegSetValueExA
RegDeleteKeyA
RegDeleteValueW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
SetEntriesInAclA
comdlg32
GetOpenFileNameW
GetSaveFileNameW
userenv
LoadUserProfileA
UnloadUserProfile
comctl32
CreateToolbarEx
ImageList_Create
ImageList_Draw
ImageList_Destroy
ord17
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Add
ImageList_Duplicate
_TrackMouseEvent
CreatePropertySheetPageW
PropertySheetW
wininet
HttpSendRequestA
HttpQueryInfoA
InternetConnectA
InternetSetOptionA
InternetCloseHandle
InternetReadFile
InternetOpenA
HttpOpenRequestA
dsound
ord7
ord6
ord2
ord1
kernel32
SizeofResource
LoadResource
LockResource
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetFileTime
GetFileTime
OpenMutexA
FindResourceExA
ResetEvent
SetEvent
OpenEventA
CreateEventA
ExitProcess
SetUnhandledExceptionFilter
GetSystemDirectoryA
CompareFileTime
GetSystemTimeAsFileTime
GetLocalTime
FileTimeToSystemTime
lstrcatW
LoadLibraryW
WaitNamedPipeW
ReadFile
SetLastError
GetExitCodeProcess
WaitForSingleObject
BeginUpdateResourceW
EndUpdateResourceW
UpdateResourceA
CreateThread
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
LoadLibraryA
FreeLibrary
GetFileSize
SetFilePointer
WriteFile
GetFileAttributesW
lstrcmpiW
lstrcmpW
MulDiv
FormatMessageW
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
GetComputerNameA
LocalAlloc
GetExitCodeThread
SystemTimeToFileTime
MoveFileW
DeleteFileW
GetTempPathW
CreateFileW
FindFirstFileW
FindClose
GetUserDefaultUILanguage
GetLocaleInfoA
CreateDirectoryW
SetCurrentDirectoryW
GetStartupInfoW
CreateProcessW
GetModuleHandleA
GetProcAddress
SetProcessShutdownParameters
GetVersionExA
GetCurrentProcess
LocalFree
GetCurrentThreadId
CloseHandle
DeviceIoControl
CreateFileA
GetCurrentProcessId
GetLastError
Sleep
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrlenW
TerminateProcess
SystemTimeToTzSpecificLocalTime
GetFileSizeEx
SetEndOfFile
SetFilePointerEx
GlobalUnlock
GlobalLock
GlobalAlloc
GetDriveTypeW
RemoveDirectoryW
FindNextFileW
SetFileAttributesW
GetLogicalDrives
ProcessIdToSessionId
SleepEx
CreateDirectoryA
DeleteFileA
GlobalFree
IsBadReadPtr
lstrcmpA
LocalFileTimeToFileTime
GetSystemDirectoryW
lstrcpyA
GetCurrentDirectoryA
FindResourceA
DuplicateHandle
CreateSemaphoreA
SetThreadPriority
TlsSetValue
GetCurrentThread
TlsAlloc
ResumeThread
TlsGetValue
InterlockedExchange
GetStartupInfoA
CreateMutexA
Sections
.text Size: 568KB - Virtual size: 566KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ