win32_remote.pdb
Behavioral task
behavioral1
Sample
win32_remote.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
win32_remote.exe
Resource
win10v2004-20240412-en
General
-
Target
win32_remote.exe
-
Size
704KB
-
MD5
2783a76f46f07b45dcc4514bd67daeb4
-
SHA1
a2ec57d564f9b29cc9798ddad730ecda0af4fcc0
-
SHA256
9ca85bbfed42b252002390fe9c5dbbfbe2e76c6e69f681204dd1d403b8f1ce2d
-
SHA512
00c25cff3239d5b7dc091340468228911eeb3037024feb0029eda2d9e4632dd5c603936d084ee47da0582e10d19e7e697574682fcb3e225c932be693282ebbc2
-
SSDEEP
12288:I0M5551VeifM4D9ohl4wjiVzRuWFpSte+cgKlT701zbR/zLsi5VmBiJ8RLYTlIP:vEvJHzRiFcgwf6FsiU+8RLYTCPPdoJ
Malware Config
Signatures
-
Industroyer 1 IoCs
Contains code associated with parsing industroyer's configuration file.
Processes:
resource yara_rule sample win_industroyer_w4 -
Industroyer family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource win32_remote.exe
Files
-
win32_remote.exe.exe windows:5 windows x86 arch:x86
5555d6854cda03e02340917da5096fe1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantInit
SysFreeString
ws2_32
WSASetLastError
getaddrinfo
WSAStartup
getservbyname
getservbyport
WSACleanup
WSAGetLastError
freeaddrinfo
socket
shutdown
setsockopt
sendto
select
recvfrom
ntohs
listen
inet_addr
htons
htonl
getsockname
getpeername
connect
closesocket
bind
accept
inet_ntoa
gethostbyaddr
gethostbyname
crypt32
CertGetCertificateChain
CertGetNameStringA
CertVerifyTimeValidity
CertAddEncodedCertificateToStore
CertFreeCertificateContext
CertFreeCertificateChain
secur32
DecryptMessage
EncryptMessage
FreeContextBuffer
QueryCredentialsAttributesA
QueryContextAttributesA
ApplyControlToken
DeleteSecurityContext
InitializeSecurityContextA
AcquireCredentialsHandleA
user32
PostThreadMessageA
kernel32
FlushFileBuffers
HeapFree
HeapAlloc
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetTimeZoneInformation
MoveFileExW
DeleteFileW
GetStringTypeW
SystemTimeToTzSpecificLocalTime
FindNextFileW
FindFirstFileExW
GetConsoleCP
WriteFile
ReadConsoleW
GetConsoleMode
HeapReAlloc
SetStdHandle
GetOEMCP
FreeEnvironmentStringsW
GetProcessHeap
GetCommandLineA
SetEndOfFile
GetFileType
CreateDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetDriveTypeW
SetConsoleCtrlHandler
GetModuleHandleExW
LoadLibraryExW
WriteConsoleW
HeapSize
FileTimeToSystemTime
FormatMessageA
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetProcAddress
ReadFile
SetFilePointerEx
CloseHandle
LoadLibraryA
GetModuleHandleA
CreateFileW
SearchPathA
LocalFree
FlushInstructionCache
VirtualProtectEx
VirtualQueryEx
GetCurrentProcess
TerminateProcess
GetThreadSelectorEntry
GetLastError
SetLastError
ReadProcessMemory
WriteProcessMemory
GetThreadContext
SetThreadContext
SuspendThread
ResumeThread
WaitForDebugEvent
ContinueDebugEvent
DebugActiveProcess
SetEvent
WaitForSingleObject
GetSystemInfo
CreateEventA
GetLogicalDriveStringsW
GetSystemDirectoryA
GetCurrentDirectoryA
QueryDosDeviceW
OpenProcess
GetVersionExA
GetCurrentProcessId
DecodePointer
ExitProcess
IsDebuggerPresent
Sleep
GetSystemTimeAsFileTime
FormatMessageW
QueryPerformanceCounter
QueryPerformanceFrequency
GetExitCodeProcess
GetEnvironmentStringsW
CreateThread
GetCurrentThreadId
TerminateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
GetStdHandle
CreateSemaphoreA
CreateProcessW
SearchPathW
GetFullPathNameW
GetModuleFileNameW
GetFileAttributesW
MultiByteToWideChar
IsValidCodePage
GetACP
GetCPInfo
IsDBCSLeadByteEx
WideCharToMultiByte
FindClose
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
GetModuleHandleW
InitializeSListHead
TlsFree
RtlUnwind
RaiseException
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
Sections
.text Size: 507KB - Virtual size: 507KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ