Overview
overview
10Static
static
10My2[1].exe
windows7-x64
10My2[1].exe
windows10-2004-x64
10NagTracking[1].htm
windows7-x64
1NagTracking[1].htm
windows10-2004-x64
1NagTracking[2].htm
windows7-x64
1NagTracking[2].htm
windows10-2004-x64
1NagTracking[3].htm
windows7-x64
1NagTracking[3].htm
windows10-2004-x64
1newsetup[1].exe
windows7-x64
7newsetup[1].exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
My2[1].exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
My2[1].exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
NagTracking[1].htm
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
NagTracking[1].htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
NagTracking[2].htm
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
NagTracking[2].htm
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
NagTracking[3].htm
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
NagTracking[3].htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
newsetup[1].exe
Resource
win7-20220901-en
General
-
Target
87c74248de50d081b467ac5b0200abd8.bin
-
Size
4.6MB
-
MD5
87c74248de50d081b467ac5b0200abd8
-
SHA1
5536fffc545f00d6f2099c8aa574a464ba6e5893
-
SHA256
cefa5780c734c3c17e13a8c8d0d64190911b22679912be1517b3e93849842e05
-
SHA512
e66cbf986d0d3758ef014ddb468044cca2b6453fca6c18e818d5e95362350e5a9b9ee6827d31ffe4aebdc0f9b1fe9c95b7959b95dfd3e4afcdcff86d32396b03
-
SSDEEP
98304:cFTjm5AM2691zcaCxAnOyGnbDDq7g7oFZBYEUgJo55eEEFW4Wg4E/:cF3me2caCiOyaHWgwfRrEE9D4s
Malware Config
Extracted
aurora
45.128.234.60:8081
Signatures
-
Aurora family
Files
-
87c74248de50d081b467ac5b0200abd8.bin.zip
Password: infected
-
My2[1].exe.exe windows x64
Password: infected
c24ea937b2b0d62e829e8a8faeff5a8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateSemaphoreW
DeleteCriticalSection
EnterCriticalSection
GetLastError
GetModuleFileNameW
GetStartupInfoW
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__iob_func
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_assert
_cexit
_commode
_errno
_fmode
_initterm
_onexit
_wcmdln
_wcsicmp
_wgetenv
abort
calloc
exit
fprintf
fputwc
free
fwprintf
fwrite
localeconv
malloc
memcpy
memset
realloc
signal
strcat
strerror
strlen
strncmp
strstr
vfprintf
wcscat
wcscpy
wcslen
wcsncmp
wcsstr
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
NagTracking[1].htm.html
-
NagTracking[2].htm.html
-
NagTracking[3].htm.html
-
newsetup[1].exe.exe windows x64
Password: infected
9cbefe68f395e67356e2a5d8d1b285c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WriteFile
WriteConsoleW
WaitForMultipleObjects
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
SwitchToThread
SuspendThread
SetWaitableTimer
SetUnhandledExceptionFilter
SetProcessPriorityBoost
SetEvent
SetErrorMode
SetConsoleCtrlHandler
ResumeThread
PostQueuedCompletionStatus
LoadLibraryA
LoadLibraryW
SetThreadContext
GetThreadContext
GetSystemInfo
GetSystemDirectoryA
GetStdHandle
GetQueuedCompletionStatusEx
GetProcessAffinityMask
GetProcAddress
GetEnvironmentStringsW
GetConsoleMode
FreeEnvironmentStringsW
ExitProcess
DuplicateHandle
CreateWaitableTimerExW
CreateThread
CreateIoCompletionPort
CreateFileA
CreateEventA
CloseHandle
AddVectoredExceptionHandler
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 224KB - Virtual size: 610KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ