Static task
static1
Behavioral task
behavioral1
Sample
TrojanCozyBear.exe
Resource
win10v2004-20240226-en
General
-
Target
TrojanCozyBear.bin
-
Size
330KB
-
MD5
3d3363598f87c78826c859077606e514
-
SHA1
8b357ff017df3ed882b278d0dbbdf129235d123d
-
SHA256
01468b1d3e089985a4ed255b6594d24863cfd94a647329c631e4f4e52759f8a9
-
SHA512
11a9b8dc666877695a7ea0683c83d057b7539fae7e445250d71fd34fdc557df946b4938bf419ddbdc5f4439f3d828ddb4d83d3a9f7f18cb92454da6fdfd99b24
-
SSDEEP
6144:ul5gIO0ZQWhRE0pPuZR4JKeZHBC9FP0/wLi6xVraC/KSNv:ul5gIO0ZQWE08z40e/CDs/+dxQC/l
Malware Config
Signatures
Files
-
TrojanCozyBear.bin.exe windows:5 windows x86 arch:x86
2695b09a1edda655e0df4b2ef196f37a
Code Sign
74:65:f7:35:98:f3:ec:9d:44:ae:2b:54:17:4c:be:4fCertificate
IssuerCN=Advanced Micro Devices\, Inc.Not Before02/07/2014, 21:13Not After31/12/2039, 23:59SubjectCN=Advanced Micro Devices\, Inc.1b:14:7f:b0:a2:17:d8:5d:dc:2c:c7:2c:d4:7e:9c:0b:83:0a:1c:58Signer
Actual PE Digest1b:14:7f:b0:a2:17:d8:5d:dc:2c:c7:2c:d4:7e:9c:0b:83:0a:1c:58Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetProcessHeap
GetModuleFileNameW
GetSystemDirectoryW
CopyFileW
GetCurrentProcessId
FindResourceW
LoadResource
GetModuleHandleW
SizeofResource
LockResource
VirtualProtect
CloseHandle
CreateFileA
SetFilePointer
CreateDirectoryW
WriteFile
GetFileAttributesW
CreateFileW
MultiByteToWideChar
GetProcAddress
LoadLibraryA
lstrlenA
WideCharToMultiByte
LocalFree
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
LoadLibraryW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
HeapReAlloc
GetStringTypeW
LCMapStringW
SetStdHandle
WriteConsoleW
FlushFileBuffers
HeapAlloc
ExpandEnvironmentStringsW
CreatePipe
GetLastError
ReadFile
GetVersionExW
WaitForSingleObject
SetHandleInformation
InterlockedDecrement
CreateProcessW
SetUnhandledExceptionFilter
SetErrorMode
Sleep
IsDebuggerPresent
ExitProcess
user32
wsprintfW
advapi32
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
CryptReleaseContext
CryptAcquireContextW
ole32
CoInitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
VariantClear
SysFreeString
SysStringLen
VariantInit
shlwapi
PathQuoteSpacesW
PathFileExistsW
PathAddBackslashW
StrStrIW
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ