Static task
static1
Behavioral task
behavioral1
Sample
busybox.exe
Resource
win10-20231020-es
General
-
Target
busybox.exe
-
Size
607KB
-
MD5
55aa9c47e2f7bb164437a6f56856c4d9
-
SHA1
0355d6b6d4633317dea201c2554718f3e298d2ac
-
SHA256
09ff6e9d0db9b036e32fdd9f9a603bb27b7c2803fe1dc8612729c27b02780f24
-
SHA512
a5b7c95f1aa9caeff134557f18070ec58c352f78ae09e3b9cc379547ff9278b207395ce62d9b73ab194f4d865bbd7f6875eb35336bfb9989b0594f493a443cbf
-
SSDEEP
12288:9Aq1istk0gQ+8JJc48JRvJ/dGlL9ZBgsFhAKw/ukJ6VRaoq0OlKtkuS/0iuTu:yq1iygCJ0rxGp3gsFlw2kdoq/KtkQiuy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource busybox.exe
Files
-
busybox.exe.exe windows:4 windows x86
6577e2c56b463da917ab6c9953aefd85
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AccessCheck
CheckTokenMembership
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
DuplicateToken
EqualSid
GetSecurityInfo
GetTokenInformation
GetUserNameA
OpenProcessToken
SaferComputeTokenFromLevel
SaferCreateLevel
SetTokenInformation
SystemFunction036
kernel32
CloseHandle
CreateConsoleScreenBuffer
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreatePipe
CreateProcessA
CreateRemoteThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EnterCriticalSection
FileTimeToSystemTime
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
FindClose
FindFirstFileA
FindFirstVolumeW
FindNextFileA
FindNextVolumeW
FindVolumeClose
FlushFileBuffers
FreeLibrary
GenerateConsoleCtrlEvent
GetACP
GetCPInfo
GetCompressedFileSizeA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetConsoleWindow
GetCurrentProcess
GetDiskFreeSpaceExA
GetDiskFreeSpaceExW
GetDriveTypeA
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesExA
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetFullPathNameA
GetLastError
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetNumberOfConsoleInputEvents
GetProcAddress
GetProcessAffinityMask
GetProcessId
GetProcessTimes
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GetVolumeInformationA
GetVolumeInformationW
InitializeCriticalSection
IsDBCSLeadByteEx
IsValidCodePage
IsWow64Process
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFree
MapViewOfFile
MoveFileExA
MultiByteToWideChar
OpenProcess
PeekConsoleInputW
PeekNamedPipe
Process32First
Process32Next
ReadConsoleInputA
ReadConsoleInputW
ReadDirectoryChangesW
ReadProcessMemory
ResetEvent
SetConsoleActiveScreenBuffer
SetConsoleCP
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleOutputCP
SetConsoleScreenBufferSize
SetConsoleTextAttribute
SetConsoleTitleA
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleInformation
SetLastError
SetSystemTime
SetUnhandledExceptionFilter
Sleep
SleepEx
TerminateProcess
TlsGetValue
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
msvcrt
__getmainargs
__initenv
__mb_cur_max
__p___argv
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_access
_amsg_exit
_cexit
_environ
_errno
_exit
_fdopen
_filbuf
_fstati64
_fullpath
_get_osfhandle
_getch
_initterm
_iob
_isatty
_lseeki64
_onexit
_open
_open_osfhandle
_pipe
_putenv
_setjmp3
_setmode
_stricmp
_strnicmp
_telli64
_tzset
_vsnprintf
abort
atof
atoi
bsearch
calloc
clearerr
clock
exit
fclose
feof
ferror
fflush
fgets
fopen
fprintf
fputc
fputs
fread
free
fseek
fwrite
getenv
isalnum
isalpha
iscntrl
isgraph
islower
isprint
ispunct
isspace
isupper
isxdigit
localeconv
malloc
mbstowcs
memchr
memcmp
memcpy
memmove
memset
mktime
localtime
gmtime
ctime
_timezone
putc
putchar
qsort
rand
realloc
rename
setbuf
setlocale
signal
sprintf
srand
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strftime
strlen
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtok
strtol
strtoul
tolower
toupper
ungetc
vfprintf
time
wcscpy
wcslen
wcsncmp
wcstombs
longjmp
_write
_wcsnicmp
_unlink
_umask
_tzset
_strdup
_spawnve
_rmdir
_read
_open
_mktemp
_mkdir
_getpid
_getcwd
_getche
_fileno
_fdopen
_dup2
_dup
_creat
_close
_chmod
_chdir
_stricmp
user32
DispatchMessageA
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
ws2_32
WSACleanup
WSAEnumNetworkEvents
WSAEventSelect
WSAGetLastError
WSASetLastError
WSASocketA
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
freeaddrinfo
getaddrinfo
gethostbyaddr
gethostname
getnameinfo
getpeername
getservbyname
inet_addr
inet_ntoa
listen
recv
select
setsockopt
shutdown
Sections
.text Size: 477KB - Virtual size: 477KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE