Static task
static1
Behavioral task
behavioral1
Sample
39b914c8064becf3df1df39b0517bda05371e90b8b5fe15aad275faac634876f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
39b914c8064becf3df1df39b0517bda05371e90b8b5fe15aad275faac634876f.exe
Resource
win10v2004-en-20220113
General
-
Target
39b914c8064becf3df1df39b0517bda05371e90b8b5fe15aad275faac634876f
-
Size
329KB
-
MD5
c2e51a827d684412a97a61ed5d02bcd7
-
SHA1
7e4cebc4c1d5423a6d793a1bb5463f33e9801d4b
-
SHA256
39b914c8064becf3df1df39b0517bda05371e90b8b5fe15aad275faac634876f
-
SHA512
b0ac47cf2019553459351bbfd7048428c052c7af65ba985c220241f2d08d3d43bbeba86c211072b5e1cc61a2ed4d628dfb3534bdd49970cc8c513e97b93d7ae0
-
SSDEEP
6144:181sEQLeCweY0N49U1HToYJECc+jdPq4AONXZ8me0J:181WeCwe949U1HcYJECxBTX40J
Malware Config
Signatures
-
GoldenSpy Payload 1 IoCs
Processes:
resource yara_rule sample goldenspy_svm_payload -
Goldenspy family
Files
-
39b914c8064becf3df1df39b0517bda05371e90b8b5fe15aad275faac634876f.exe windows x86
29e4df680c39f2772a4a1cf9e63915f1
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WinExec
CreateMutexA
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
ReadFile
IsDBCSLeadByteEx
WriteFile
CreateFileW
MultiByteToWideChar
GetLastError
WideCharToMultiByte
HeapSize
WriteConsoleW
FlushFileBuffers
HeapReAlloc
DeleteFileA
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetFileSize
GetLocalTime
GetProcessHeap
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExA
GetFileAttributesExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlUnwind
RaiseException
FreeLibrary
LoadLibraryExW
GetStdHandle
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetFileType
SetEndOfFile
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
ole32
CoCreateGuid
CoUninitialize
CoInitialize
wininet
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
HttpAddRequestHeadersA
InternetSetOptionA
HttpEndRequestA
InternetWriteFile
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
HttpSendRequestExA
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ