Behavioral task
behavioral1
Sample
c1710d377ca25776aebd3b67979c8263f92adf7794ea3145dbf7a6e9fbb839bb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c1710d377ca25776aebd3b67979c8263f92adf7794ea3145dbf7a6e9fbb839bb.exe
Resource
win10v2004-20240412-en
General
-
Target
256fef8b4394a01979267523831b6a1c6168a35b6e3bf4db3468bdf7c98c198c
-
Size
8KB
-
MD5
1d38b96bb0071c23d61a1a4737b0e253
-
SHA1
fdfcffb355073586995af50b773639e52bb0d74e
-
SHA256
256fef8b4394a01979267523831b6a1c6168a35b6e3bf4db3468bdf7c98c198c
-
SHA512
080e34a59229f0c07143c31c3dc2a73f62e6e27a71302a15ba224123a08dfad9accd0f22af7555b9f3f804bc5fb86a45413a0c947a6bcd8ec53860f88a9ab67c
-
SSDEEP
192:oq6Yu2rrcRNFjSDnlXmVdNOHvhgJ8psc3kDLzzFa5+//O8/mbrNV2zqEJ1/kK:oqhZruEF4dEHvBpsi0fP+7NnKGK
Malware Config
Extracted
systembc
stompantz.xyz:4001
89.105.201.43:4001
Signatures
-
Systembc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c1710d377ca25776aebd3b67979c8263f92adf7794ea3145dbf7a6e9fbb839bb.exe
Files
-
256fef8b4394a01979267523831b6a1c6168a35b6e3bf4db3468bdf7c98c198c.zip
Password: infected
-
c1710d377ca25776aebd3b67979c8263f92adf7794ea3145dbf7a6e9fbb839bb.exe.exe windows:4 windows x86 arch:x86
4fa6fcb0c994042642a5c4c2e43cda86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowTextA
GetWindowThreadProcessId
LoadCursorA
LoadIconA
RegisterClassA
SendMessageA
CreateWindowExA
ShowWindow
TranslateMessage
UpdateWindow
GetMessageA
GetClassNameA
DispatchMessageA
DefWindowProcA
wsprintfA
kernel32
SetEvent
SetFilePointer
Sleep
RemoveDirectoryA
ResetEvent
OpenProcess
WriteFile
WaitForSingleObject
VirtualFree
VirtualAlloc
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FileTimeToSystemTime
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentVariableA
GetLastError
GetLocalTime
GetModuleHandleA
GetTempPathA
GetVolumeInformationA
LocalAlloc
LocalFree
SystemTimeToFileTime
advapi32
GetSidSubAuthority
GetUserNameW
OpenProcessToken
GetTokenInformation
wsock32
htons
inet_addr
inet_ntoa
recv
select
send
setsockopt
shutdown
socket
connect
closesocket
ioctlsocket
WSAStartup
WSACleanup
shell32
CommandLineToArgvW
ws2_32
freeaddrinfo
WSAIoctl
getaddrinfo
ole32
CoUninitialize
CoInitialize
CoCreateInstance
secur32
GetUserNameExW
AcquireCredentialsHandleA
DecryptMessage
DeleteSecurityContext
EncryptMessage
FreeContextBuffer
FreeCredentialsHandle
GetUserNameExA
InitializeSecurityContextA
QueryContextAttributesA
psapi
GetModuleFileNameExA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ