Overview
overview
10Static
static
101JATLV2V.zip
windows7-x64
11JATLV2V.zip
windows10-2004-x64
1NagTracking[1].htm
windows7-x64
1NagTracking[1].htm
windows10-2004-x64
1NagTracking[2].htm
windows7-x64
1NagTracking[2].htm
windows10-2004-x64
1getipaddress[1].htm
windows7-x64
1getipaddress[1].htm
windows10-2004-x64
1handdiy_4[1].exe
windows7-x64
7handdiy_4[1].exe
windows10-2004-x64
7plus[1].htm
windows7-x64
1plus[1].htm
windows10-2004-x64
1Behavioral task
behavioral1
Sample
1JATLV2V.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1JATLV2V.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
NagTracking[1].htm
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
NagTracking[1].htm
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
NagTracking[2].htm
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
NagTracking[2].htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
getipaddress[1].htm
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
getipaddress[1].htm
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
handdiy_4[1].exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
handdiy_4[1].exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
plus[1].htm
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
plus[1].htm
Resource
win10v2004-20220812-en
General
-
Target
1JATLV2V.zip
-
Size
702KB
-
MD5
9432576b7508d5eaca738572ab453f7e
-
SHA1
998e2447c44f0d273169c0411854ce7c36c7d249
-
SHA256
c7bb8ef7307caaf62d84ab706dfb41059ee39bc345cfc49b2b60ff70f0f4a240
-
SHA512
7e53a3f31fb06d594da153e559b686574e208d6e131a7f247941562a1e181717c1d72c1bed57ad5694daf002ce30ae9ff2bfd79c29d62d9d969ea64797061ce4
-
SSDEEP
12288:V7/hizi33/pys9MIBIGReXfLDbyjmnWjwChRHfQf9U9Shvy0xekEh:VL3/pyZPOeXfemWjX3mU9JZh
Malware Config
Extracted
socelars
https://hdbywe.s3.us-west-2.amazonaws.com/dweg26/
Signatures
-
Socelars family
-
Socelars payload 1 IoCs
resource yara_rule static1/unpack001/handdiy_4[1].exe family_socelars
Files
-
1JATLV2V.zip.zip
-
NagTracking[1].htm.html
-
NagTracking[2].htm.html
-
getipaddress[1].htm.html
-
handdiy_4[1].exe.exe windows x86
d69e4c13e25f0ad622344ac56118c0df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
GetModuleFileNameA
GetCurrentProcessId
OpenProcess
GetModuleFileNameW
SetLastError
WaitForSingleObject
CreateEventW
FreeLibrary
WinExec
GetPrivateProfileStringW
CopyFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
LocalFree
LocalAlloc
LoadResource
FindResourceW
SizeofResource
LockResource
GetTickCount
GetCurrentThread
Sleep
GetProcessHeap
HeapAlloc
GetLastError
GetTempPathA
SetCurrentDirectoryW
GetShortPathNameA
LoadLibraryW
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
SystemTimeToFileTime
DosDateTimeToFileTime
GetCurrentProcess
DuplicateHandle
CloseHandle
WriteFile
SetFileTime
SetFilePointer
ReadFile
GetFileType
CreateFileW
CreateDirectoryW
TerminateProcess
GetCurrentDirectoryW
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetTimeZoneInformation
GetFileSizeEx
GetConsoleOutputCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCommandLineW
GetCommandLineA
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
RaiseException
GetStringTypeW
WriteConsoleW
GetCPInfo
CompareStringEx
LCMapStringEx
DecodePointer
EncodePointer
InitializeCriticalSectionEx
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
GetModuleHandleW
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FlushFileBuffers
QueryPerformanceCounter
MapViewOfFile
CreateFileMappingW
AreFileApisANSI
TryEnterCriticalSection
HeapCreate
HeapFree
EnterCriticalSection
GetFullPathNameW
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
GetFileAttributesW
GetCurrentThreadId
UnmapViewOfFile
HeapValidate
HeapSize
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
LoadLibraryA
WaitForSingleObjectEx
DeleteFileA
DeleteFileW
HeapReAlloc
GetSystemInfo
HeapCompact
HeapDestroy
UnlockFile
LockFileEx
GetFileSize
DeleteCriticalSection
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
LookupAccountNameW
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetLengthSid
FreeSid
EqualSid
DuplicateToken
AllocateAndInitializeSid
AddAccessAllowedAce
AccessCheck
OpenThreadToken
OpenProcessToken
shell32
ShellExecuteExA
ole32
CoInitializeEx
CoGetObject
CoUninitialize
wininet
InternetGetCookieExA
netapi32
Netbios
ntdll
RtlInitUnicodeString
NtFreeVirtualMemory
LdrEnumerateLoadedModules
RtlEqualUnicodeString
RtlAcquirePebLock
NtAllocateVirtualMemory
RtlReleasePebLock
RtlNtStatusToDosError
RtlCreateHeap
RtlDestroyHeap
RtlAllocateHeap
RtlFreeHeap
NtClose
NtOpenKey
NtEnumerateValueKey
NtQueryValueKey
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.epliwki Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.epliwki Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
plus[1].htm