Static task
static1
Behavioral task
behavioral1
Sample
ocean.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ocean.exe
Resource
win10v2004-20230915-en
General
-
Target
ocean
-
Size
4.7MB
-
MD5
6feb011b812df8745b208f007d3a7b90
-
SHA1
49107f64e9ea8447ba80a8e8bd4b75b8188d597e
-
SHA256
f8747e4926ff8d675bc704d9b038e1cc9e4f395ee64ba361f35014569350995b
-
SHA512
132918ec1a4f6b200fdde247414d11c3cf12601a5c2baa621efd93fdcb8082d1ecea0b06daf117a030f7298f2d22938f4e90da1fa0ecef7004e96a9b5390eb9e
-
SSDEEP
49152:E+WEzY0TDn1ZBfG9QgqNzZNmGu+27+w6KuaFbxE5hHjSlCB7Qkbt/TaKHT+e2WC4:dFDskDZz+qagZnF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ocean
Files
-
ocean.exe windows:6 windows x64
2c4533ec7e2e1770e99a27b5ad3e902d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
NtDeviceIoControlFile
RtlVirtualUnwind
NtCreateFile
NtCancelIoFileEx
NtQuerySystemInformation
NtQueryInformationProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlNtStatusToDosError
NtWriteFile
RtlGetVersion
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SystemFunction036
OpenProcessToken
GetTokenInformation
IsValidSid
GetLengthSid
CopySid
LookupAccountSidW
iphlpapi
GetIfTable2
FreeMibTable
GetIfEntry2
GetAdaptersAddresses
kernel32
CreateThread
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
CloseHandle
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
CreateSemaphoreA
SetConsoleCtrlHandler
WaitForSingleObject
ReleaseSemaphore
TryAcquireSRWLockExclusive
GlobalUnlock
GlobalLock
GlobalSize
GlobalAlloc
GlobalFree
GetProcessHeap
HeapFree
GetLastError
HeapAlloc
OpenProcess
GetProcessTimes
GetSystemTimes
GetProcessIoCounters
LocalFree
VirtualQueryEx
ReadProcessMemory
GetTickCount64
GlobalMemoryStatusEx
GetLogicalDrives
GetDiskFreeSpaceExW
GetCurrentProcessId
CreateFileW
GetDriveTypeW
GetVolumeInformationW
DeviceIoControl
GetSystemInfo
SleepConditionVariableSRW
ReleaseSRWLockShared
AcquireSRWLockShared
GetCurrentProcess
DuplicateHandle
SetHandleInformation
CreateIoCompletionPort
GetQueuedCompletionStatusEx
PostQueuedCompletionStatus
SetFileCompletionNotificationModes
Sleep
GetModuleHandleA
GetProcAddress
FreeEnvironmentStringsW
ReleaseMutex
FindClose
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
GetCurrentThread
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetStdHandle
WriteFileEx
SleepEx
ReadFileEx
WakeAllConditionVariable
WakeConditionVariable
QueryPerformanceCounter
QueryPerformanceFrequency
HeapReAlloc
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetFileInformationByHandle
GetFileInformationByHandleEx
FindFirstFileW
DeleteFileW
GetFinalPathNameByHandleW
GetConsoleMode
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
SetCurrentDirectoryW
ExitProcess
GetFullPathNameW
CreateNamedPipeW
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
MultiByteToWideChar
WriteConsoleW
netapi32
NetUserGetInfo
NetUserGetLocalGroups
NetUserEnum
NetApiBufferFree
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
oleaut32
SysFreeString
SysAllocString
VariantClear
pdh
PdhCloseQuery
PdhOpenQueryA
PdhGetFormattedCounterValue
PdhRemoveCounter
PdhAddEnglishCounterW
PdhCollectQueryData
powrprof
CallNtPowerInformation
psapi
GetModuleFileNameExW
GetPerformanceInfo
secur32
InitializeSecurityContextW
EncryptMessage
LsaGetLogonSessionData
LsaEnumerateLogonSessions
LsaFreeReturnBuffer
FreeContextBuffer
DecryptMessage
ApplyControlToken
AcquireCredentialsHandleA
QueryContextAttributesW
DeleteSecurityContext
AcceptSecurityContext
FreeCredentialsHandle
shell32
CommandLineToArgvW
user32
GetClipboardData
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
ws2_32
setsockopt
getaddrinfo
freeaddrinfo
WSACleanup
WSAStartup
WSAGetLastError
WSAIoctl
closesocket
getpeername
getsockname
WSASocketW
bind
connect
ioctlsocket
getsockopt
shutdown
recv
send
WSASend
crypt32
CertDuplicateCertificateChain
CertAddCertificateContextToStore
CertOpenStore
CertCloseStore
CertFreeCertificateChain
CertDuplicateStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertVerifyCertificateChainPolicy
CertEnumCertificatesInStore
CertGetCertificateChain
bcrypt
BCryptGenRandom
vcruntime140
memmove
memset
_CxxThrowException
__C_specific_handler
__current_exception
__current_exception_context
__CxxFrameHandler3
memcmp
memcpy
api-ms-win-crt-string-l1-1-0
wcslen
api-ms-win-crt-heap-l1-1-0
realloc
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
pow
api-ms-win-crt-runtime-l1-1-0
_initialize_narrow_environment
_configure_narrow_argv
_get_initial_narrow_environment
_set_app_type
_seh_filter_exe
_initterm
exit
_register_onexit_function
terminate
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_initterm_e
_exit
_initialize_onexit_table
_crt_atexit
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ