Static task
static1
Behavioral task
behavioral1
Sample
423Down.url
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
423Down.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
file/Install.cmd
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
file/Install.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
file/NSudo.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
file/NSudo.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
安装.cmd
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
安装.cmd
Resource
win10v2004-20231215-en
General
-
Target
bd4e60e597777005b650741b1ac2f20f07b3de3f9112fc55872aba9e0c95511d
-
Size
47KB
-
MD5
cf47dc939216ab2da31fa49c4da4ae6e
-
SHA1
134b4a87263cc207d37581e90954788f345f6849
-
SHA256
bd4e60e597777005b650741b1ac2f20f07b3de3f9112fc55872aba9e0c95511d
-
SHA512
7583dfd014e9371452417c215e4525e4dcdc9b0abe790eabed9eae4cab32609686bfea115e470488792710a18d66498f6d5ec582fe981cdba9a0aa7a7640ab99
-
SSDEEP
768:lFFzvM2JrZxiDvufaa9GbWssY7JnKBaq96DRdGnDtYq0KL0vjlDxIGb6EExWOU:l75JTijuCjWs37JKBj6XGnOvKL0vHIox
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/file/NSudo.exe
Files
-
bd4e60e597777005b650741b1ac2f20f07b3de3f9112fc55872aba9e0c95511d.zip
-
423Down.url
-
file/1.reg
-
file/Install.cmd
-
file/NSudo.exe.exe windows:6 windows x64 arch:x64
1a0b96fcf290b1a8643cbe4a033a6415
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcess
ExpandEnvironmentStringsW
CreateFileW
ResumeThread
OpenProcess
GetTickCount64
GetCurrentThread
WaitForSingleObjectEx
QueryPerformanceFrequency
CloseHandle
HeapAlloc
GetProcAddress
SetPriorityClass
GetProcessHeap
FreeLibrary
SleepEx
QueryPerformanceCounter
LoadLibraryExW
TerminateProcess
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetFileInformationByHandleEx
HeapFree
ReadFile
MulDiv
DeleteCriticalSection
DecodePointer
LoadResource
FindResourceExW
RaiseException
LockResource
GetCurrentThreadId
GetFileAttributesW
InitializeCriticalSectionEx
LeaveCriticalSection
GetCommandLineW
EnterCriticalSection
SetLastError
SizeofResource
VerifyVersionInfoW
GetModuleHandleW
VerSetConditionMask
GetLastError
MultiByteToWideChar
GetModuleFileNameW
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
user32
BeginPaint
GetDC
MonitorFromWindow
LoadImageW
DialogBoxParamW
GetDlgItem
SetWindowTextW
EndDialog
SetWindowLongPtrW
GetWindowTextW
EndPaint
SendMessageW
DrawIconEx
GetClientRect
ChangeWindowMessageFilter
UnregisterClassW
gdi32
GetDeviceCaps
comdlg32
GetOpenFileNameW
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
GetAce
CloseServiceHandle
OpenSCManagerW
SetTokenInformation
AllocateAndInitializeSid
IsWellKnownSid
AddAce
OpenProcessToken
CreateRestrictedToken
FreeSid
SetThreadToken
StartServiceW
InitializeAcl
CreateProcessAsUserW
OpenServiceW
GetLengthSid
DuplicateTokenEx
AddAccessAllowedAce
OpenThreadToken
QueryServiceStatusEx
GetTokenInformation
shell32
DragQueryFileW
DragFinish
ole32
CoInitializeEx
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesW
WTSQueryUserToken
msvcrt
??0exception@@QEAA@AEBQEBD@Z
_CxxThrowException
__C_specific_handler
_cexit
__setusermatherr
_initterm
_initterm_e
exit
_exit
_set_fmode
_c_exit
_errno
_amsg_exit
__wgetmainargs
atexit
memset
memmove
__DestructExceptionObject
memcpy
_lock
_unlock
__dllonexit
__set_app_type
_wcmdln
_commode
?terminate@@YAXXZ
_XcptFilter
malloc
wcsrchr
free
strncmp
_wcsicmp
??3@YAXPEAX@Z
_wcsnicmp
wcsstr
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
??2@YAPEAX_K@Z
__CxxFrameHandler3
memcmp
abort
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
安装.cmd