Static task
static1
Behavioral task
behavioral1
Sample
GOLDSTUBBY.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLDSTUBBY.exe
Resource
win10v2004-20231222-en
General
-
Target
GOLDSTUBBY.exe
-
Size
998KB
-
MD5
d943cc3ab511293545495d6b35d138bb
-
SHA1
9fae8754af73bc0ebd5d97c99357042488b055cf
-
SHA256
b737f5afe160bc29f60d548b87f773dc7b4ec2310fa78e46e8a15ffca9d440b4
-
SHA512
b1068446ae9f13e7a7dc927dd98b7cbd161b5f39807024c006d201beed4674a06021c720f200e92c3386d617475836071be290a6a5c5aca7678e5edde54398ec
-
SSDEEP
24576:xNW4HQg9VKRv16/2YvrveX/UwGgLfM+5n:xAgov1W2YDmXswGWZn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource GOLDSTUBBY.exe
Files
-
GOLDSTUBBY.exe.exe windows:6 windows x64 arch:x64
2544a7cef12a0291e1219aa78d8bc192
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
WSACleanup
closesocket
getaddrinfo
WSAStartup
send
socket
connect
recv
freeaddrinfo
kernel32
OutputDebugStringW
HeapSize
GetCurrentProcess
GetModuleHandleA
GetCurrentThread
LoadLibraryA
CloseHandle
GetThreadContext
GetProcAddress
IsDebuggerPresent
CheckRemoteDebuggerPresent
WriteProcessMemory
RtlAddFunctionTable
Sleep
VirtualProtectEx
VirtualAllocEx
ReadProcessMemory
CreateRemoteThread
VirtualFreeEx
GetExitCodeProcess
Process32First
GetVolumeInformationA
OpenProcess
CreateToolhelp32Snapshot
Process32Next
CreateThread
Beep
MultiByteToWideChar
GlobalAlloc
GlobalFree
GlobalLock
WideCharToMultiByte
GlobalUnlock
QueryPerformanceFrequency
VerSetConditionMask
FreeLibrary
VerifyVersionInfoW
QueryPerformanceCounter
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
CompareStringW
GetTimeFormatW
GetDateFormatW
CreateProcessW
WaitForSingleObject
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileSizeEx
HeapFree
HeapAlloc
WriteFile
WriteConsoleW
GetModuleFileNameW
GetFileType
GetStdHandle
ReadFile
GetModuleHandleExW
ExitProcess
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
HeapReAlloc
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
LCMapStringW
RtlUnwind
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
FormatMessageA
LocalFree
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
SetEndOfFile
SetFilePointerEx
GetTempPathW
AreFileApisANSI
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
GetCommandLineW
user32
DispatchMessageA
TranslateMessage
PeekMessageA
PostQuitMessage
UpdateWindow
GetWindowLongW
AdjustWindowRectEx
GetKeyState
LoadCursorA
DestroyWindow
GetDC
SetWindowPos
MonitorFromWindow
EnumDisplayMonitors
ScreenToClient
SetWindowTextW
WindowFromPoint
ShowWindow
GetCapture
SetWindowLongA
ClientToScreen
IsChild
GetMonitorInfoA
GetForegroundWindow
DefWindowProcA
CreateWindowExA
SetLayeredWindowAttributes
SetFocus
BringWindowToTop
SetCapture
SetCursor
SetWindowLongW
GetClientRect
UnregisterClassA
RegisterClassExA
ReleaseCapture
SetForegroundWindow
IsIconic
SetCursorPos
ReleaseDC
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetWindowRect
GetSystemMetrics
GetDesktopWindow
MessageBoxA
gdi32
GetDeviceCaps
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
d3d9
Direct3DCreate9
Sections
.text Size: 758KB - Virtual size: 757KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ