Static task
static1
Behavioral task
behavioral1
Sample
ShellCode.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ShellCode.exe
Resource
win10v2004-20230915-en
General
-
Target
※狼情BackDoor※(infected).zip
-
Size
19KB
-
MD5
ff9a93ff4050ec5c480a9b4673fe7436
-
SHA1
e0a1040fc60b37b7da8018e5fdbd1f3efab59f59
-
SHA256
52a4a6d58e999ce66c6460581c84324e39354c030658cc7008c36b321725b50c
-
SHA512
7a6b0bbaaac4bef8ed9acc404af18b3b4a99dd15aa1be1634dcc9de5a77637ef8804738ba73238cde01b11470dd1317c58f4d6ae75e873d53e35dc7b818dfd04
-
SSDEEP
384:JRFYI/+spmIRgN8pZeYHotSy/DYkHkJyr75Y9mtcsMTQx8jzGkVnOGGo9y3SSn:pn3dRgNxEaHkor75Y9EcfkxIGkReo9GV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ShellCode.exe
Files
-
※狼情BackDoor※(infected).zip.zip
Password: infected
-
ShellCode.exe.exe windows:5 windows x86
Password: infected
1b967704fac330263f0622604304da41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100d
ord8636
ord15836
ord3235
ord4874
ord16531
ord4887
ord5352
ord5319
ord5315
ord5349
ord5370
ord5328
ord5357
ord5366
ord5336
ord5340
ord5344
ord5332
ord5361
ord5324
ord1771
ord1764
ord1766
ord1760
ord1753
ord13136
ord13138
ord15019
ord3432
ord10105
ord11845
ord7669
ord2742
ord4876
ord13037
ord9834
ord15828
ord12781
ord4028
ord12950
ord10007
ord16524
ord16523
ord15834
ord16614
ord16610
ord16612
ord16613
ord16611
ord2963
ord8986
ord3469
ord3472
ord14876
ord6839
ord3333
ord3334
ord3580
ord3581
ord11273
ord12229
ord11859
ord9903
ord12993
ord4261
ord9235
ord2267
ord14664
ord999
ord1669
ord2553
ord8941
ord2196
ord9289
ord322
ord7675
ord12481
ord11882
ord1335
ord4409
ord5600
ord14101
ord7506
ord862
ord8993
ord316
ord7518
ord12557
ord14811
ord6522
ord2871
ord12986
ord4133
ord3544
ord3543
ord3431
ord13032
ord6334
ord11078
ord10079
ord4545
ord2597
ord7190
ord417
ord8165
ord1059
ord1024
ord1057
ord8706
ord2244
ord1434
ord934
ord15065
ord4281
ord1444
ord1421
ord1442
ord9292
ord9200
ord13844
ord16308
ord5822
ord2559
ord13447
ord13448
ord15835
ord8635
ord15833
ord10266
ord4337
ord4279
ord13929
ord8656
ord2072
ord16627
ord12826
ord15706
ord13440
ord8709
ord16021
ord16018
ord16023
ord16020
ord16022
ord16019
ord4044
ord6497
ord13113
ord13121
ord4983
ord8994
ord11247
ord13131
ord13082
ord13910
ord5664
ord6047
ord6306
ord10219
ord6019
ord6309
ord5667
ord5884
ord5647
ord8412
ord8413
ord8403
ord5882
ord8998
ord11073
ord10078
ord4660
ord2693
ord14148
ord7497
ord986
ord11194
ord8320
ord16596
ord1435
ord2478
ord2294
msvcr100d
_lock
__dllonexit
_unlock
_CRT_RTC_INITW
_setmbcp
??_V@YAXPAX@Z
__CxxFrameHandler3
fwrite
memmove_s
fclose
fopen
fseek
ftell
malloc
fread
_onexit
_invoke_watson
_controlfp_s
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_initterm_e
_initterm
_CrtDbgReportW
_CrtSetCheckCount
_acmdln
_ismbblead
exit
_cexit
_XcptFilter
_exit
__getmainargs
_amsg_exit
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
kernel32
LockResource
LoadResource
FindResourceA
EncodePointer
DecodePointer
SizeofResource
InterlockedCompareExchange
HeapSetInformation
MulDiv
GetStartupInfoW
WideCharToMultiByte
IsDebuggerPresent
Sleep
InterlockedExchange
MultiByteToWideChar
RaiseException
lstrlenA
FreeLibrary
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LoadLibraryW
GetProcAddress
VirtualAlloc
user32
GetSystemMetrics
EnumWindows
CopyRect
IsRectEmpty
PtInRect
SetRect
SetRectEmpty
EqualRect
InflateRect
OffsetRect
IntersectRect
SubtractRect
UnionRect
comctl32
InitCommonControlsEx
oleaut32
SysFreeString
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ