C:\BuildAgent2\work\f25946ab0e58f7d5\v3\bin\Release\MBlauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2/OHIk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2/OHIk.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2/tttss111111.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
2/tttss111111.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2/tttss1111111.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
2/tttss1111111.exe
Resource
win10v2004-20240508-en
General
-
Target
fa61ffac78d9a3bacf2d378995f942b73d640db713a55a8e6181dcb8df0d2715.zip
-
Size
650KB
-
MD5
228e7b0a2d7771bd84a06f068dc4a280
-
SHA1
8d2f53d6d86aa49aab5dd53ca40f7f0816916d61
-
SHA256
e5e09b92ff1102df6f3b4a60a249d938cdda2014c8755dac5b036dae89001633
-
SHA512
e1de1a7c93498bb8b910c59164bdc8a0ce76fb392ebc9d73f676c2720afef6c964d4ff2904818ddd51f02f50707c108fa45d8feee679ff5a23257736db5ffca7
-
SSDEEP
12288:CtX4hjxeRlU+0TVxmGiwoimBJlH9IHfUydFeSNyLB2cH1zdbpo/iw1RSZW:KIhaWsrvBJld5mF4LocFflw1RSZW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/2/OHIk.exe
Files
-
fa61ffac78d9a3bacf2d378995f942b73d640db713a55a8e6181dcb8df0d2715.zip.zip
Password: infected
-
fa61ffac78d9a3bacf2d378995f942b73d640db713a55a8e6181dcb8df0d2715.rar.rar
Password: infected
-
2/OHIk.exe.exe windows:5 windows x86 arch:x86
Password: infected
d5d24961912c093d9f898b2d349daff6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LocalFree
FreeLibrary
InterlockedDecrement
LocalAlloc
SetCurrentDirectoryW
FormatMessageW
CreateProcessW
CloseHandle
GetModuleFileNameW
CreateFileW
WriteConsoleW
GetProcAddress
GetLastError
GetFullPathNameW
LoadLibraryW
DecodePointer
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
SetLastError
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
WriteFile
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetStringTypeW
GetProcessHeap
user32
MessageBoxW
advapi32
RegSetValueExW
RegCreateKeyExW
RegCloseKey
oleaut32
SafeArrayPutElement
SafeArrayCreateVector
SafeArrayDestroy
VariantClear
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
2/ffff.lop
-
2/ffff.pol
-
2/tttss111111.exe.exe windows:6 windows x64 arch:x64
Password: infected
1147194ef02b355e02af1f49c57e76a8
Code Sign
4e:40:e4:37:54:ed:e6:8c:00:00:00:00:51:d3:94:7fCertificate
IssuerCN=Entrust Root Certification Authority - G2,OU=See www.entrust.net/legal-terms+OU=(c) 2009 Entrust\, Inc. - for authorized use only,O=Entrust\, Inc.,C=USNot Before07/05/2021, 15:43Not After07/11/2030, 16:13SubjectCN=Entrust Code Signing Root Certification Authority - CSBR1,O=Entrust\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
35:af:b7:7b:9d:34:1f:6a:fc:8f:84:46:ab:31:35:2bCertificate
IssuerCN=Entrust Code Signing Root Certification Authority - CSBR1,O=Entrust\, Inc.,C=USNot Before07/05/2021, 19:19Not After29/12/2040, 23:59SubjectCN=Entrust Extended Validation Code Signing CA - EVCS2,O=Entrust\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
31:9d:9d:48:1a:b6:f5:e0:92:bc:c5:e3:4f:f7:3c:5bCertificate
IssuerCN=Entrust Extended Validation Code Signing CA - EVCS2,O=Entrust\, Inc.,C=USNot Before11/10/2022, 12:36Not After11/10/2025, 12:36SubjectSERIALNUMBER=26502275,CN=JetBrains s.r.o.,O=JetBrains s.r.o.,L=Praha,C=CZ,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.3=#1302435aExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
4e:40:e4:37:54:ed:e6:8c:00:00:00:00:51:d3:94:7fCertificate
IssuerCN=Entrust Root Certification Authority - G2,OU=See www.entrust.net/legal-terms+OU=(c) 2009 Entrust\, Inc. - for authorized use only,O=Entrust\, Inc.,C=USNot Before07/05/2021, 15:43Not After07/11/2030, 16:13SubjectCN=Entrust Code Signing Root Certification Authority - CSBR1,O=Entrust\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
25:bc:2b:f3:29:ca:10:7f:1e:a9:ba:88:85:d4:9d:3bCertificate
IssuerCN=Entrust Code Signing Root Certification Authority - CSBR1,O=Entrust\, Inc.,C=USNot Before07/05/2021, 19:22Not After29/12/2040, 23:59SubjectCN=Entrust Time Stamping CA - TS2,O=Entrust\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
4a:14:dd:b8:91:ab:9c:0f:99:f1:25:ed:c5:9a:b6:d5Certificate
IssuerCN=Entrust Time Stamping CA - TS2,O=Entrust\, Inc.,C=USNot Before04/10/2022, 17:22Not After01/01/2029, 00:00SubjectCN=Entrust Timestamp Authority - TSA2,O=Entrust\, Inc.,L=Ottawa,ST=Ontario,C=CAExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
ff:2f:d6:e4:81:8c:64:02:1c:d3:23:95:52:68:b4:1e:13:9f:16:e0:17:3e:50:73:b8:34:0b:1f:f9:b2:ba:76Signer
Actual PE Digestff:2f:d6:e4:81:8c:64:02:1c:d3:23:95:52:68:b4:1e:13:9f:16:e0:17:3e:50:73:b8:34:0b:1f:f9:b2:ba:76Digest Algorithmsha256PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileA
CreateFileW
GetDriveTypeA
GetFileAttributesW
QueryDosDeviceW
GetVolumeNameForVolumeMountPointW
CloseHandle
SetErrorMode
GetOverlappedResult
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
CreateEventA
CreateThread
SetThreadPriority
GetModuleHandleW
GetProcAddress
WaitForMultipleObjects
GetVolumeInformationA
ReadDirectoryChangesW
MultiByteToWideChar
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
GetStringTypeW
GetProcessHeap
SetFilePointerEx
WriteConsoleW
HeapSize
HeapReAlloc
ReadFile
ReadConsoleW
VirtualAlloc
Sections
.text Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
2/tttss1111111.exe.exe windows:6 windows x64 arch:x64
Password: infected
1147194ef02b355e02af1f49c57e76a8
Code Sign
4e:40:e4:37:54:ed:e6:8c:00:00:00:00:51:d3:94:7fCertificate
IssuerCN=Entrust Root Certification Authority - G2,OU=See www.entrust.net/legal-terms+OU=(c) 2009 Entrust\, Inc. - for authorized use only,O=Entrust\, Inc.,C=USNot Before07/05/2021, 15:43Not After07/11/2030, 16:13SubjectCN=Entrust Code Signing Root Certification Authority - CSBR1,O=Entrust\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
35:af:b7:7b:9d:34:1f:6a:fc:8f:84:46:ab:31:35:2bCertificate
IssuerCN=Entrust Code Signing Root Certification Authority - CSBR1,O=Entrust\, Inc.,C=USNot Before07/05/2021, 19:19Not After29/12/2040, 23:59SubjectCN=Entrust Extended Validation Code Signing CA - EVCS2,O=Entrust\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
31:9d:9d:48:1a:b6:f5:e0:92:bc:c5:e3:4f:f7:3c:5bCertificate
IssuerCN=Entrust Extended Validation Code Signing CA - EVCS2,O=Entrust\, Inc.,C=USNot Before11/10/2022, 12:36Not After11/10/2025, 12:36SubjectSERIALNUMBER=26502275,CN=JetBrains s.r.o.,O=JetBrains s.r.o.,L=Praha,C=CZ,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.3=#1302435aExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
4e:40:e4:37:54:ed:e6:8c:00:00:00:00:51:d3:94:7fCertificate
IssuerCN=Entrust Root Certification Authority - G2,OU=See www.entrust.net/legal-terms+OU=(c) 2009 Entrust\, Inc. - for authorized use only,O=Entrust\, Inc.,C=USNot Before07/05/2021, 15:43Not After07/11/2030, 16:13SubjectCN=Entrust Code Signing Root Certification Authority - CSBR1,O=Entrust\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
25:bc:2b:f3:29:ca:10:7f:1e:a9:ba:88:85:d4:9d:3bCertificate
IssuerCN=Entrust Code Signing Root Certification Authority - CSBR1,O=Entrust\, Inc.,C=USNot Before07/05/2021, 19:22Not After29/12/2040, 23:59SubjectCN=Entrust Time Stamping CA - TS2,O=Entrust\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
4a:14:dd:b8:91:ab:9c:0f:99:f1:25:ed:c5:9a:b6:d5Certificate
IssuerCN=Entrust Time Stamping CA - TS2,O=Entrust\, Inc.,C=USNot Before04/10/2022, 17:22Not After01/01/2029, 00:00SubjectCN=Entrust Timestamp Authority - TSA2,O=Entrust\, Inc.,L=Ottawa,ST=Ontario,C=CAExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
ff:2f:d6:e4:81:8c:64:02:1c:d3:23:95:52:68:b4:1e:13:9f:16:e0:17:3e:50:73:b8:34:0b:1f:f9:b2:ba:76Signer
Actual PE Digestff:2f:d6:e4:81:8c:64:02:1c:d3:23:95:52:68:b4:1e:13:9f:16:e0:17:3e:50:73:b8:34:0b:1f:f9:b2:ba:76Digest Algorithmsha256PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileA
CreateFileW
GetDriveTypeA
GetFileAttributesW
QueryDosDeviceW
GetVolumeNameForVolumeMountPointW
CloseHandle
SetErrorMode
GetOverlappedResult
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
CreateEventA
CreateThread
SetThreadPriority
GetModuleHandleW
GetProcAddress
WaitForMultipleObjects
GetVolumeInformationA
ReadDirectoryChangesW
MultiByteToWideChar
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
GetStringTypeW
GetProcessHeap
SetFilePointerEx
WriteConsoleW
HeapSize
HeapReAlloc
ReadFile
ReadConsoleW
VirtualAlloc
Sections
.text Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ