Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/_Install/Uti/Xenia/OServerSrv.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/_Install/Uti/Xenia/OServerSrv.exe
Resource
win10v2004-20230220-en
General
-
Target
OServerSrv.exe
-
Size
4.6MB
-
MD5
1ab51c4940ac93c6bb72a436b7430241
-
SHA1
c7f18862a75ead7de28f1afc8ef5d62589fcd64d
-
SHA256
f0bfc546575a950f980262dee518bb987e163687cce8ca494ca440cce9c69a1c
-
SHA512
7abc21b757c719b9ed8959b3821dc36a7632ee3efb80f92a2737b276e51b4c268453b483b3ceb9d7983231b0cbaab3b3dd7fae9e21fec4f725b041f736719e7e
-
SSDEEP
98304:6W6ZdNmk/ezmCJ4ar77/4YrJ3DTaNbgfp/HTtRngceKrdPiW4d00hAdfRem1sGn:t0mac440Y1zmN2pbnetZQdJ7uU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Device/HarddiskVolume3/_Install/Uti/Xenia/OServerSrv.exe
Files
-
OServerSrv.exe.zip
Password: ow&b!54X6x_#4gT@9BT4
-
Device/HarddiskVolume3/_Install/Uti/Xenia/OServerSrv.exe.exe windows x86
Password: ow&b!54X6x_#4gT@9BT4
a34c5a20d71d9a9a0afe48a48333d749
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CloseHandle
FindFirstFileA
FindNextFileA
FindClose
CreateMutexA
WaitForSingleObject
ReleaseMutex
UnmapViewOfFile
CreateSemaphoreA
ReleaseSemaphore
CreateFileMappingA
MapViewOfFileEx
CreateFileA
GetFileSizeEx
FormatMessageA
LocalFree
CreateDirectoryA
RemoveDirectoryA
SetEndOfFile
SetFilePointerEx
WriteFile
GetProcAddress
OpenProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentVariableA
SetCurrentDirectoryA
GetFileAttributesA
GetFullPathNameA
GetSystemTime
FileTimeToSystemTime
GetTimeZoneInformation
LoadLibraryA
AreFileApisANSI
GetExitCodeProcess
CreateProcessA
FreeLibrary
GetStdHandle
GetConsoleMode
VerSetConditionMask
IsWow64Process
GetProfileStringA
VerifyVersionInfoW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
DeleteFileA
SetFileTime
FlushFileBuffers
GetFileTime
ReadFile
SetFilePointer
ExitProcess
SwitchToThread
TlsSetValue
LocalAlloc
MapViewOfFile
OpenFileMappingA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
TlsAlloc
CreateEventA
WaitForMultipleObjects
IsBadWritePtr
OpenSemaphoreA
GetVersion
FlushInstructionCache
VirtualProtect
DeviceIoControl
LockFile
UnlockFile
IsBadStringPtrA
IsBadStringPtrW
GetDriveTypeA
ReadConsoleW
CreateFileW
WriteConsoleW
SetStdHandle
OutputDebugStringW
GetConsoleCP
SetEnvironmentVariableA
GetModuleFileNameW
GetOEMCP
IsValidCodePage
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
LoadLibraryExW
GetCPInfo
HeapReAlloc
GetModuleHandleExW
GetFileType
RtlUnwind
RaiseException
GetStringTypeW
Sleep
GetProcessTimes
IsBadReadPtr
GetComputerNameA
GetNativeSystemInfo
GetSystemWindowsDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetSystemInfo
SetLastError
GetModuleHandleA
GetModuleFileNameA
VirtualQuery
GetVersionExA
SetPriorityClass
TlsFree
SetThreadPriority
GetCurrentThread
TerminateProcess
HeapFree
GetCurrentDirectoryA
SetConsoleCtrlHandler
OpenEventA
SetEvent
GetACP
SystemTimeToFileTime
GetTempPathA
GetLocalTime
GetDiskFreeSpaceA
GetUserDefaultUILanguage
GetExitCodeThread
GetCurrentThreadId
DuplicateHandle
GetTickCount
GetStartupInfoW
GetCurrentProcessId
GetCurrentProcess
GetProcessHeap
HeapAlloc
DecodePointer
EncodePointer
TlsGetValue
HeapCreate
user32
GetSystemMenu
AppendMenuA
LoadStringA
DrawMenuBar
TranslateMessage
DispatchMessageA
GetSystemMetrics
MessageBoxA
CharLowerBuffA
CharUpperBuffA
wsprintfA
CallMsgFilterA
PeekMessageA
shell32
ShellExecuteExA
advapi32
StartServiceA
QueryServiceStatus
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
RegFlushKey
RegDeleteKeyA
RegSetValueExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
GetUserNameA
InitializeSecurityDescriptor
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
ReadEventLogA
CloseEventLog
OpenEventLogA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ws2_32
inet_addr
bind
getpeername
WSAGetLastError
socket
shutdown
setsockopt
send
select
recvfrom
getsockopt
ioctlsocket
connect
closesocket
accept
__WSAFDIsSet
gethostbyaddr
inet_ntoa
htons
WSACleanup
WSAStartup
freeaddrinfo
getaddrinfo
gethostname
sendto
gethostbyname
recv
Sections
__wibu00 Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
__wibu01 Size: 4KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
__wibu02 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
__wibu03 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
__wibu04 Size: 52KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
__wibu05 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
manifest.json