C:\Users\aytar\OneDrive\Masaüstü\Nexus Hack\x64\Release\Nexus.pdb
Static task
static1
Behavioral task
behavioral1
Sample
44ff7f19dc33127eed5eb9fb27e623bec08664ae3665926e30b1654024c88e76.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
44ff7f19dc33127eed5eb9fb27e623bec08664ae3665926e30b1654024c88e76.exe
Resource
win10v2004-20240508-en
General
-
Target
81f329dfee632b4058b189795a99696f.bin
-
Size
9.1MB
-
MD5
a0beaa2bf39fbe20bc8ab522ffb90a3b
-
SHA1
7b31f7678db59cf2f8a6d8aec6fc49923ba1878b
-
SHA256
553fdf0c768b8cec6ae55356c03ad14f21839c3c4175c19b3ff215718d122144
-
SHA512
3771e4fbb4156796ac1198e8089cd7a1da42b10c9e4a0a9daf1e097bc5d715a2b1b9c0281706cf4b5369d743d2c40e8e4ecbb69cf54296b74d1b559295b42cb3
-
SSDEEP
196608:D2FQBgvHNMPeP+AcIldwTzmM6DTPhV74JK/OjEek5O+7aoCVQBz:kmgv6em4OzmMQTPbMK/OjEW+7aoCcz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/44ff7f19dc33127eed5eb9fb27e623bec08664ae3665926e30b1654024c88e76.exe
Files
-
81f329dfee632b4058b189795a99696f.bin.zip
Password: infected
-
44ff7f19dc33127eed5eb9fb27e623bec08664ae3665926e30b1654024c88e76.exe.exe windows:6 windows x64 arch:x64
Password: infected
b21a2df598e01efced6c77447b00ee4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
accept
WSACleanup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
shutdown
select
__WSAFDIsSet
inet_pton
WSAStartup
closesocket
getnameinfo
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
WSAGetLastError
wldap32
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord143
ord45
ord200
ord301
crypt32
CryptStringToBinaryA
CertFreeCertificateContext
CertAddCertificateContextToStore
CertFindCertificateInStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
advapi32
CreateServiceA
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CopySid
IsValidSid
OpenProcessToken
ConvertSidToStringSidW
GetLengthSid
GetTokenInformation
RegCloseKey
CloseServiceHandle
OpenSCManagerA
DeleteService
ChangeServiceConfigA
ControlService
StartServiceA
OpenServiceA
RegQueryValueExW
kernel32
FreeLibraryAndExitThread
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
SetFilePointerEx
SetConsoleCtrlHandler
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
FlushFileBuffers
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedPushEntrySList
RtlUnwindEx
ReadProcessMemory
Sleep
ReadFile
WriteFile
PeekNamedPipe
CreateFileW
GetLastError
CloseHandle
GetCurrentProcessId
WaitNamedPipeW
lstrlenW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
WriteProcessMemory
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
SetEnvironmentVariableW
VirtualProtectEx
AllocConsole
HeapFree
GetCurrentProcess
InitializeCriticalSectionEx
HeapSize
HeapReAlloc
HeapAlloc
DecodePointer
HeapDestroy
LocalFree
DeleteCriticalSection
GetProcessHeap
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
VerSetConditionMask
FreeLibrary
QueryPerformanceCounter
SetConsoleTextAttribute
WriteConsoleW
WaitForSingleObject
GetCurrentDirectoryA
CreateFileA
CreateThread
CreateProcessW
GetConsoleWindow
GetExitCodeProcess
VirtualAllocEx
VirtualFreeEx
VirtualQueryEx
SetLastError
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
GetSystemDirectoryA
GetModuleHandleA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
WaitForMultipleObjects
GetFileSizeEx
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
FormatMessageW
GetModuleHandleW
GetSystemTimeAsFileTime
RtlUnwind
SwitchToFiber
DeleteFiber
CreateFiber
LoadLibraryW
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
RaiseException
OutputDebugStringW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
CompareStringEx
GetStringTypeW
LCMapStringEx
GetLocaleInfoEx
EncodePointer
SleepConditionVariableSRW
WakeAllConditionVariable
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
ExitThread
LoadLibraryExW
RtlPcToFileHeader
GetStdHandle
SetEndOfFile
RtlVirtualUnwind
user32
MessageBoxW
mouse_event
GetAsyncKeyState
UpdateWindow
SetWindowLongW
LoadCursorW
FindWindowW
SendInput
BringWindowToTop
CreateWindowExA
MoveWindow
ShowWindow
RegisterClassExW
GetWindowRect
FindWindowExW
DefWindowProcW
GetCursorPos
FindWindowA
MessageBoxA
SetWindowDisplayAffinity
GetWindowLongW
GetProcessWindowStation
LoadIconW
GetUserObjectInformationW
SetClipboardData
GetSystemMetrics
GetClassNameA
DispatchMessageW
PeekMessageW
GetClipboardData
EnumWindows
TranslateMessage
SetForegroundWindow
IsIconic
GetWindowTextW
GetKeyState
ScreenToClient
GetCapture
ClientToScreen
IsChild
GetForegroundWindow
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
shell32
ShellExecuteW
ShellExecuteA
dwmapi
DwmExtendFrameIntoClientArea
d3d9
Direct3DCreate9
d3dx9_43
D3DXCreateTextureFromFileInMemory
D3DXCreateFontW
bcrypt
BCryptGenRandom
rpcrt4
UuidToStringA
RpcStringFreeA
UuidCreate
userenv
UnloadUserProfile
imm32
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
Sections
.text Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.9MB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ