Static task
static1
Behavioral task
behavioral1
Sample
Monoxide/Monoxide x64.exe
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
Monoxide/Monoxide x86.exe
Resource
win10-20220812-en
General
-
Target
Monoxide.zip
-
Size
200KB
-
MD5
e77bca3013a7cdd34871d734a294d60b
-
SHA1
697b1f62007b9b9fbe6f1e98aede0e5800a6a6f7
-
SHA256
0d1c5ead44e729aa9b25547bad1f128759d144b8ecdec25bb28d67d694a5b3e0
-
SHA512
d9ff6c0fdc7cc2378b3de99abce734b6248c8c91fe78cd6c68cd5e84c6400beb0c5192eb9aa28fd22f60744e8c26d29fa5b6dad79296a1c84f0d2275a30628e2
-
SSDEEP
6144:p8ESSodSaIpdhPkHACXrDnBW+VAzZU8DIx:prSdwaItcRngPZ/DIx
Malware Config
Signatures
Files
-
Monoxide.zip.zip
Password: MalwarePad
-
Monoxide/Monoxide x64.exe.exe windows x64
Password: MalwarePad
a2f9cc400443004644952ac829162570
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
winmm
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutOpen
waveOutPrepareHeader
kernel32
Sleep
GetLastError
lstrcatW
DeleteFileW
CloseHandle
LoadLibraryW
CreateThread
GetProcAddress
LocalFree
CreateProcessW
FreeLibrary
CopyFileW
lstrcpyW
lstrcmpW
GetCurrentThreadId
HeapAlloc
GetProcessHeap
CreateMutexW
WaitForSingleObject
TerminateThread
HeapFree
HeapSize
GetStringTypeW
GetLogicalDriveStringsW
ReadFile
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetFileAttributesW
CreateFileW
FindClose
GetTempPathW
GetModuleFileNameW
RemoveDirectoryW
WriteFile
GetCurrentProcess
FindNextFileW
GetFileType
FindFirstFileW
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
SetStdHandle
GetACP
GetModuleHandleExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
user32
GetMessageW
DispatchMessageW
SetTimer
TranslateMessage
EnumDisplayMonitors
GetWindowRect
GetDC
EnumChildWindows
CallNextHookEx
GetSystemMetrics
SetWindowTextW
DrawIcon
DestroyCursor
ShowWindow
GetCursorInfo
RedrawWindow
MoveWindow
UnhookWindowsHookEx
EnumWindows
mouse_event
SetWindowsHookExW
SetCursorPos
ReleaseDC
EnableWindow
MessageBoxW
ExitWindowsEx
gdi32
DeleteDC
CreatePen
Ellipse
DeleteObject
CreateSolidBrush
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
StretchBlt
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
OpenProcessToken
shell32
ShellExecuteW
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Monoxide/Monoxide x86.exe.exe windows x86
Password: MalwarePad
9ac10d3eb45e2af35269569591fda84b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutOpen
waveOutPrepareHeader
kernel32
Sleep
GetLastError
lstrcatW
DeleteFileW
CloseHandle
LoadLibraryW
CreateThread
GetProcAddress
LocalFree
CreateProcessW
FreeLibrary
CopyFileW
lstrcpyW
lstrcmpW
GetCurrentThreadId
HeapAlloc
GetProcessHeap
CreateMutexW
WaitForSingleObject
TerminateThread
HeapFree
HeapSize
GetStringTypeW
GetFileType
GetLogicalDriveStringsW
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetFileAttributesW
CreateFileW
FindClose
GetTempPathW
GetModuleFileNameW
RemoveDirectoryW
WriteFile
GetCurrentProcess
FindNextFileW
FindFirstFileW
WriteConsoleW
ReadFile
HeapReAlloc
DecodePointer
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
GetACP
GetModuleHandleExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
user32
GetMessageW
DispatchMessageW
SetTimer
TranslateMessage
EnumDisplayMonitors
GetWindowRect
GetDC
EnumChildWindows
CallNextHookEx
GetSystemMetrics
SetWindowTextW
DrawIcon
DestroyCursor
ShowWindow
GetCursorInfo
RedrawWindow
MoveWindow
UnhookWindowsHookEx
EnumWindows
mouse_event
SetWindowsHookExW
SetCursorPos
ReleaseDC
EnableWindow
MessageBoxW
ExitWindowsEx
gdi32
DeleteDC
CreatePen
Ellipse
DeleteObject
CreateSolidBrush
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
StretchBlt
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
shell32
ShellExecuteW
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ