Static task
static1
Behavioral task
behavioral1
Sample
Skill Hack WarRock-Hacker.de[9.Juni.2009].dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Skill Hack WarRock-Hacker.de[9.Juni.2009].dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Skill Hack WarRock-Hacker.de[9.Juni.2009].exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Skill Hack WarRock-Hacker.de[9.Juni.2009].exe
Resource
win10v2004-20240226-en
General
-
Target
ca0817be7329d1764590fb7f1fe09036
-
Size
51KB
-
MD5
ca0817be7329d1764590fb7f1fe09036
-
SHA1
9b8f54b2b737a5c3637f05717c0d4568ac2427d0
-
SHA256
32e6b0ea398e3cf66275449f4eed43074d91e67642e1a15f8fdb46db262c3511
-
SHA512
eda34c1a5409a01eb8b0f251cc539fa4c0032e0b6d66e3874bf7fd15124b947ff7725ba8028105f28983ce9a10a5c478abb4af2ae3fd38c59556b2377043fa26
-
SSDEEP
1536:DQo3kh9OposAw/O/czy9S2agdLmPkuNU0:33zAn//4EmP1
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Skill Hack WarRock-Hacker.de[9.Juni.2009].dll unpack001/Skill Hack WarRock-Hacker.de[9.Juni.2009].exe
Files
-
ca0817be7329d1764590fb7f1fe09036.rar
-
Skill Hack WarRock-Hacker.de[9.Juni.2009].dll.dll windows:4 windows x86 arch:x86
0067747914bbd7407be889a82520976b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtect
CreateThread
CompareStringW
CompareStringA
GetCommandLineA
GetVersion
GetProcAddress
GetModuleHandleA
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
IsBadWritePtr
IsBadReadPtr
HeapValidate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
SetConsoleCtrlHandler
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
Sleep
LCMapStringA
LCMapStringW
RtlUnwind
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
SetFilePointer
SetStdHandle
GetTimeZoneInformation
GetLocaleInfoW
FlushFileBuffers
CloseHandle
SetEnvironmentVariableA
user32
GetAsyncKeyState
MessageBoxA
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Skill Hack WarRock-Hacker.de[9.Juni.2009].exe.exe windows:4 windows x86 arch:x86
b692f00e374a2f6b06a549bda72de50e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaLenBstr
__vbaFreeVarList
__vbaEnd
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaRecAnsiToUni
ord519
__vbaStrCat
__vbaLsetFixstr
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
ord301
ord595
__vbaObjSet
_adj_fdiv_m16i
ord303
_adj_fdivr_m16i
__vbaStrFixstr
ord307
ord309
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaVarTstEq
DllFunctionCall
_adj_fpatan
__vbaRecUniToAnsi
EVENT_SINK_Release
ord600
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
__vbaFPException
ord645
_CIlog
__vbaNew2
__vbaR8Str
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaI4Var
__vbaStrComp
__vbaVarDup
__vbaStrToAnsi
_CIatan
__vbaStrMove
_allmul
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ