Behavioral task
behavioral1
Sample
abd49fd6f57d4f0ffef794257692c61b2089ee412ae27fe36a9ffee41f9d5e14.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abd49fd6f57d4f0ffef794257692c61b2089ee412ae27fe36a9ffee41f9d5e14.exe
Resource
win10v2004-20220812-en
General
-
Target
abd49fd6f57d4f0ffef794257692c61b2089ee412ae27fe36a9ffee41f9d5e14
-
Size
1.1MB
-
MD5
ad539ebdf9e34e02be487134cf9a6713
-
SHA1
b5af8a12c5a6ed369debaad7eab59e3cb1715e2d
-
SHA256
abd49fd6f57d4f0ffef794257692c61b2089ee412ae27fe36a9ffee41f9d5e14
-
SHA512
386291d7dd9fa62f7514e784a238bd7a5099a0d2edd8af6085c61e3953a6914faf3dc299f07d56bed3b5b337a18c8b636c84f88693d3bc2512f8dfd51e711492
-
SSDEEP
24576:g3BzKGHF0bxTCFvXwKt/aISpu4Qc6F3v1HT2BzN2tgGS3YzYhoHWxVGI8WIQbQ:KV4xTCwu4Qc6/F87gIwQ
Malware Config
Signatures
-
Detects Surtr Payload 1 IoCs
resource yara_rule sample family_surtr -
Surtr family
Files
-
abd49fd6f57d4f0ffef794257692c61b2089ee412ae27fe36a9ffee41f9d5e14.exe windows x86
fdca3b784089a0c89db7b9646500f7f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetLocaleInfoA
OpenProcess
SetFileAttributesW
CreateToolhelp32Snapshot
Sleep
CopyFileA
GetLastError
Process32NextW
GetDiskFreeSpaceExW
GetCurrentThread
LoadLibraryA
lstrcatW
DeleteFileW
Process32FirstW
CloseHandle
GetSystemInfo
HeapAlloc
GetProcAddress
SetFilePointerEx
LocalFree
ReadProcessMemory
GetCurrentProcessId
GetProcessHeap
GlobalMemoryStatusEx
GetModuleHandleW
ReleaseMutex
GetConsoleWindow
lstrcpyW
CreateDirectoryA
GetSystemTime
OpenMutexW
GetTickCount
lstrcmpW
GetDriveTypeW
IsDebuggerPresent
GetComputerNameA
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
GetVersionExW
GetFileAttributesW
CreateFileW
LocalAlloc
WaitForSingleObject
CreateMutexW
SetProcessShutdownParameters
GetModuleFileNameW
TerminateProcess
DeviceIoControl
WriteFile
lstrlenW
GetCurrentProcess
FindNextFileW
SetPriorityClass
HeapFree
VirtualProtect
VirtualFree
VirtualAlloc
GetThreadTimes
GetFileSizeEx
FindFirstFileW
ReadFile
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
CopyFileW
SetProcessPriorityBoost
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
DecodePointer
SetEndOfFile
HeapReAlloc
HeapSize
WriteConsoleW
FlushFileBuffers
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
TryEnterCriticalSection
DuplicateHandle
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
WideCharToMultiByte
EncodePointer
FreeLibrary
LoadLibraryExW
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
ExitProcess
GetModuleHandleExW
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
MoveFileExW
GetModuleFileNameA
MultiByteToWideChar
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
CreateThread
ExitThread
FreeLibraryAndExitThread
CompareStringW
LCMapStringW
ReadConsoleW
GetFileType
GetExitCodeProcess
CreateProcessA
CreateProcessW
GetFileAttributesExW
GetConsoleCP
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
user32
ShowWindow
ExitWindowsEx
GetKeyboardLayoutList
CharUpperW
MessageBoxW
SystemParametersInfoW
advapi32
OpenSCManagerW
CryptGenKey
QueryServiceStatusEx
OpenServiceW
CryptDestroyKey
CryptAcquireContextW
CloseServiceHandle
CryptEncrypt
CryptGenRandom
CryptReleaseContext
GetUserNameA
ControlService
CryptExportKey
EnumDependentServicesW
CryptImportKey
shell32
ShellExecuteW
SHEmptyRecycleBinA
ShellExecuteA
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
rstrtmgr
RmGetList
RmRegisterResources
RmEndSession
RmStartSession
iphlpapi
GetIpNetTable
ws2_32
closesocket
gethostbyname
WSAStartup
send
WSAGetLastError
htons
recv
inet_ntoa
connect
socket
WSACleanup
netapi32
NetApiBufferFree
NetShareEnum
Sections
.text Size: 1014KB - Virtual size: 1014KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ