Behavioral task
behavioral1
Sample
c1cf96e5e6a7be560cf79746d90522928bacd828554978c9e8a09a28bd3b6097.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1cf96e5e6a7be560cf79746d90522928bacd828554978c9e8a09a28bd3b6097.exe
Resource
win10v2004-20241007-en
General
-
Target
c1cf96e5e6a7be560cf79746d90522928bacd828554978c9e8a09a28bd3b6097.exe
-
Size
975KB
-
MD5
6641121be4ec07e172daf0370f969f37
-
SHA1
4eaf19ac2053628d0a4c8e85086a05a56f6fff8f
-
SHA256
c1cf96e5e6a7be560cf79746d90522928bacd828554978c9e8a09a28bd3b6097
-
SHA512
3d425c22eda7e18280d21e1f7e17486d574aeffee8123ed2aa2fdd4814e901094b7f7a0c73abea89c11cc1ceef6b5f34e6bd8d108c67ce8e7edcf08f6c713ae7
-
SSDEEP
24576:eMjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxf:bJ5gEKNikf3hBfUiWxf
Malware Config
Signatures
-
AmmyyAdmin payload 1 IoCs
resource yara_rule sample family_ammyyadmin -
Ammyyadmin family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1cf96e5e6a7be560cf79746d90522928bacd828554978c9e8a09a28bd3b6097.exe
Files
-
c1cf96e5e6a7be560cf79746d90522928bacd828554978c9e8a09a28bd3b6097.exe.exe windows:5 windows x86 arch:x86
39b2903b7498188e4955572bbeb0f3fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageA
DefWindowProcA
PostQuitMessage
GetDoubleClickTime
UpdateWindow
GetQueueStatus
LoadIconA
RegisterClassA
gdi32
CreateBitmap
IntersectClipRect
ExcludeClipRect
UpdateColors
GetTextExtentPoint32A
CreateCompatibleDC
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextExtentExPointA
GetTextMetricsA
CreateFontA
RealizePalette
msacm32
acmDriverID
acmStreamOpen
advapi32
RegQueryValueExA
RegOpenKeyA
GetUserNameA
CopySid
GetLengthSid
imm32
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
kernel32
GetModuleHandleA
GetProcAddress
HeapCreate
HeapAlloc
ExitProcess
FreeLibrary
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ