playit_cli.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f87212b62acb8d8f3b1a0ccc1b02d7af44ba09c7d6a8bf3c62bb7ec03f736166.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f87212b62acb8d8f3b1a0ccc1b02d7af44ba09c7d6a8bf3c62bb7ec03f736166.exe
Resource
win10v2004-20240802-en
General
-
Target
8af54595d5bdfec004a39451268573b2.bin
-
Size
1.6MB
-
MD5
06defb194c197e6248749bb2db3f9ac1
-
SHA1
5c980790b93afd7096c365340a18caaccdd0fb1d
-
SHA256
21c513ea9da3fed96c3e461754ae5d0fe013fca15b5d693ca7bb6884dc82ef53
-
SHA512
e9fd17d25ee63175cddbca7facd810ecd05e461dde637a6d07b54f9c83afb084e0817af453dd1fd8dffe7317d43df0aa57cb498889c891618caacbec9ef51804
-
SSDEEP
24576:n4E+HPv988wbW3GSqZi+GtjQxDWayPyLjd7L+xShoOSVbHGWbKk0S+VtNyo+Egzh:4EUPVjwJS0G1cRseoHr8k87yoN49
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f87212b62acb8d8f3b1a0ccc1b02d7af44ba09c7d6a8bf3c62bb7ec03f736166.exe
Files
-
8af54595d5bdfec004a39451268573b2.bin.zip
Password: infected
-
f87212b62acb8d8f3b1a0ccc1b02d7af44ba09c7d6a8bf3c62bb7ec03f736166.exe.exe windows:6 windows x64 arch:x64
Password: infected
e4a374a7ebd14b2417612ef9279c64a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
bcryptprimitives
ProcessPrng
api-ms-win-core-synch-l1-2-0
WakeByAddressSingle
WakeByAddressAll
WaitOnAddress
advapi32
RegOpenKeyExW
RegQueryValueExW
SystemFunction036
RegCloseKey
kernel32
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
UnhandledExceptionFilter
SwitchToThread
FindFirstFileW
GetLastError
FindClose
CloseHandle
lstrlenW
GetSystemInfo
GetCommandLineW
SetLastError
GetModuleFileNameW
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
HeapFree
HeapReAlloc
GetConsoleMode
SetConsoleMode
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetConsoleCursorPosition
WaitForMultipleObjects
GetNumberOfConsoleInputEvents
ReadConsoleInputW
FillConsoleOutputCharacterA
FillConsoleOutputAttribute
CreateFileW
GetFinalPathNameByHandleW
GetQueuedCompletionStatusEx
CreateIoCompletionPort
SetFileCompletionNotificationModes
Sleep
GetModuleHandleA
GetProcAddress
GetStdHandle
WaitForSingleObject
MultiByteToWideChar
WriteConsoleW
CreateWaitableTimerExW
SetWaitableTimer
QueryPerformanceFrequency
GetModuleHandleW
FormatMessageW
GetEnvironmentVariableW
SetFileInformationByHandle
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFullPathNameW
CreateDirectoryW
CreateThread
ExitProcess
QueryPerformanceCounter
GetSystemTimePreciseAsFileTime
HeapAlloc
GetProcessHeap
GetCurrentDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
WaitForSingleObjectEx
LoadLibraryA
GetCurrentProcess
GetCurrentProcessId
CreateMutexA
ReleaseMutex
WideCharToMultiByte
RtlVirtualUnwind
GetFileType
SetHandleInformation
PostQueuedCompletionStatus
SetConsoleCtrlHandler
FindNextFileW
DeleteFileW
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetFilePointerEx
GetConsoleOutputCP
FlushFileBuffers
HeapSize
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
EncodePointer
FlsAlloc
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
TerminateProcess
WriteFile
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
user32
GetForegroundWindow
GetWindowThreadProcessId
ToUnicodeEx
GetKeyboardLayout
bcrypt
BCryptGenRandom
ws2_32
bind
setsockopt
getaddrinfo
freeaddrinfo
WSAStartup
recvfrom
getsockopt
WSASocketW
WSAIoctl
WSACleanup
recv
send
shutdown
getsockname
getpeername
ioctlsocket
WSASend
closesocket
WSAGetLastError
sendto
connect
socket
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
ntdll
NtWriteFile
NtDeviceIoControlFile
NtReadFile
NtCreateFile
NtCancelIoFileEx
RtlNtStatusToDosError
crypt32
CertDuplicateCertificateChain
CertDuplicateStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertCloseStore
CertAddCertificateContextToStore
CertEnumCertificatesInStore
CertGetCertificateChain
CertOpenStore
CertFreeCertificateContext
CertDuplicateCertificateContext
secur32
FreeContextBuffer
QueryContextAttributesW
AcquireCredentialsHandleA
EncryptMessage
ApplyControlToken
DecryptMessage
FreeCredentialsHandle
InitializeSecurityContextW
DeleteSecurityContext
AcceptSecurityContext
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ