C:\Users\amiko\Desktop\Spider-Rat\Client\Sample1\x64\Release\Sample1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
733b4d5174669caab2bbcc9bfe51606a13346b70af59fccea4f479d1fde7b5d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
733b4d5174669caab2bbcc9bfe51606a13346b70af59fccea4f479d1fde7b5d7.exe
Resource
win10v2004-20240226-en
General
-
Target
733b4d5174669caab2bbcc9bfe51606a13346b70af59fccea4f479d1fde7b5d7
-
Size
502KB
-
MD5
1213d3dc3507ebadaf65ce7282c0b098
-
SHA1
b7a97e9ed1660af79e7aca677704ef4928bc6c21
-
SHA256
733b4d5174669caab2bbcc9bfe51606a13346b70af59fccea4f479d1fde7b5d7
-
SHA512
216ad5e49300d0502bf9fcc5850c9ea0778c82eeb8682170a22c691db0977f228ee7973a7ea4d27ba59aa75f5290eb39d81659b8e7681ecd4401991b99421c45
-
SSDEEP
12288:1swdpZi4V5bpiRuHrHHofQrRAGlqpf20:1sw/ZVnb3cfcAAOe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 733b4d5174669caab2bbcc9bfe51606a13346b70af59fccea4f479d1fde7b5d7
Files
-
733b4d5174669caab2bbcc9bfe51606a13346b70af59fccea4f479d1fde7b5d7.exe windows:5 windows x64 arch:x64
6674698194444edb880fedc2020ef675
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
lstrlenA
GetModuleHandleA
GlobalAlloc
lstrcmpA
GlobalLock
EnumResourceLanguagesA
ConvertDefaultLocale
GlobalDeleteAtom
GlobalAddAtomA
WritePrivateProfileStringA
GlobalFree
FreeResource
GlobalUnlock
MulDiv
LocalFree
FormatMessageA
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetModuleFileNameW
GlobalFlags
GetThreadLocale
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsSetValue
LocalReAlloc
TlsFree
LockFile
UnlockFile
GetFileSize
FindClose
FindFirstFileA
GetFullPathNameA
SetErrorMode
FileTimeToLocalFileTime
GetFileSizeEx
GetFileTime
VirtualQuery
VirtualAlloc
VirtualProtect
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
SetStdHandle
InitializeCriticalSectionAndSpinCount
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
SetFilePointer
FlushFileBuffers
QueryPerformanceCounter
HeapCreate
HeapSetInformation
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
WriteFile
HeapSize
ExitProcess
GetModuleHandleW
FlsAlloc
GetCurrentThread
SetLastError
FlsFree
FlsSetValue
FlsGetValue
TlsAlloc
DecodePointer
EncodePointer
IsValidCodePage
GetOEMCP
GetACP
GetFileType
GetStdHandle
SetHandleCount
HeapAlloc
LCMapStringW
LCMapStringA
GetCPInfo
HeapFree
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CreateThread
GetCurrentThreadId
ExitThread
GetFileAttributesA
GetCurrentProcess
DuplicateHandle
MultiByteToWideChar
GetCurrentProcessId
GetVersionExA
GetSystemInfo
GlobalMemoryStatusEx
GetVolumeInformationA
GetComputerNameA
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceA
GetTickCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
Sleep
InitializeCriticalSection
WaitForSingleObject
DeleteFileA
LoadLibraryA
CopyFileA
GetProcAddress
CreateDirectoryA
GetEnvironmentVariableA
FreeLibrary
CloseHandle
WinExec
GetLastError
ReadFile
FileTimeToSystemTime
HeapQueryInformation
user32
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
OffsetRect
IntersectRect
GetWindowPlacement
GetWindowRect
SystemParametersInfoA
DestroyMenu
CopyRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostThreadMessageA
RegisterClipboardFormatA
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetSystemMetrics
AppendMenuA
UnregisterClassA
MessageBoxA
SetCursor
PostQuitMessage
RegisterWindowMessageA
PostMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetSystemMenu
IsIconic
GetSysColor
GetClientRect
SendMessageA
MessageBeep
GetNextDlgGroupItem
CharUpperA
CharNextA
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
LoadCursorA
GetSysColorBrush
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
GetClassLongPtrA
GetPropA
RemovePropA
EndPaint
SetFocus
SetPropA
gdi32
DeleteObject
GetObjectA
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetStockObject
GetDeviceCaps
CreateRectRgnIndirect
GetRgnBox
GetBkColor
GetTextColor
GetMapMode
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
DeleteDC
CreateBitmap
SaveDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyExA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
GetUserNameA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
wininet
InternetCloseHandle
HttpQueryInfoA
InternetConnectA
InternetReadFile
InternetSetOptionA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetOpenA
oledlg
ord8
ole32
CoTaskMemAlloc
CreateILockBytesOnHGlobal
CoTaskMemFree
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
CoRegisterMessageFilter
CoGetClassObject
StgOpenStorageOnILockBytes
CLSIDFromString
StgCreateDocfileOnILockBytes
OleFlushClipboard
oleaut32
SysFreeString
VariantInit
SysAllocStringLen
VariantClear
VariantCopy
VariantChangeType
DispCallFunc
SysAllocString
LoadRegTypeLi
SysStringLen
SysAllocStringByteLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
ws2_32
inet_ntoa
WSAStartup
WSACleanup
gethostbyname
gethostname
Sections
.text Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ