C:\progects\mining-service\xmr\build\bin\Debug\xmr-stak-cpu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
063b05ce69a4e95891d4849e3f600bdfd8658ba6bb832d845af3ec7ac07cb8eb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
063b05ce69a4e95891d4849e3f600bdfd8658ba6bb832d845af3ec7ac07cb8eb.exe
Resource
win10v2004-20240802-en
General
-
Target
ecc58ce2bd453fe2534c668e383a1e21.zip
-
Size
1.2MB
-
MD5
81741b48f4d41b9c68f5f149d3c048f2
-
SHA1
7ece8f95369d9c4fd12266e02f80839325ce32a5
-
SHA256
1483b918ecae31e432017c1741240976149806a52909e8ff09356db2813c15e6
-
SHA512
6a73398d16b246e43e7eab7296922b682b9521eeefc086dc17ee33b794b68996c60496ccc57f2131f0dfd26223d8e16fc394dccb4b616449d46ce7730f45489d
-
SSDEEP
24576:o967ISeVihqshFW60wZjVyVxnADeTRnRuBQUWi6MKcF+l:jMpASvsjVkxAuhhMKcF+l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/063b05ce69a4e95891d4849e3f600bdfd8658ba6bb832d845af3ec7ac07cb8eb
Files
-
ecc58ce2bd453fe2534c668e383a1e21.zip.zip
Password: infected
-
063b05ce69a4e95891d4849e3f600bdfd8658ba6bb832d845af3ec7ac07cb8eb.exe windows:5 windows x64 arch:x64
Password: infected
cc830bfb429c66ba614f2ea6cf4aefc7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
connect
recv
socket
send
freeaddrinfo
getaddrinfo
shutdown
closesocket
wsock32
ntohs
ntohl
listen
getsockopt
inet_ntoa
bind
accept
setsockopt
htons
htonl
WSAGetLastError
WSASetLastError
gethostbyname
getservbyname
WSAStartup
WSACleanup
WSACancelBlockingCall
kernel32
GetCurrentDirectoryW
SetCurrentDirectoryW
SetFilePointerEx
GetProcessHeap
HeapQueryInformation
HeapReAlloc
HeapFree
MoveFileExW
EnumSystemLocalesW
FindFirstFileA
SetLastError
ReleaseSemaphore
WaitForMultipleObjects
FindNextFileA
InitializeCriticalSectionAndSpinCount
FindClose
WaitForSingleObject
MultiByteToWideChar
GetLastError
CloseHandle
RaiseException
CreateThread
DecodePointer
DeleteCriticalSection
CreateSemaphoreA
GetVolumePathNameA
GetModuleFileNameA
SizeofResource
BeginUpdateResourceA
LoadLibraryExA
FindResourceA
GetFullPathNameW
LockResource
DeleteFileA
LoadResource
FreeLibrary
UpdateResourceA
EndUpdateResourceA
CreateDirectoryA
GetEnvironmentStringsW
GetStdHandle
GetFileType
GetCurrentThreadId
GetVersion
FindFirstFileW
FindNextFileW
WideCharToMultiByte
QueryPerformanceCounter
GetCurrentProcessId
GetTickCount
GetVersionExW
GetProcAddress
LoadLibraryW
GlobalMemoryStatus
FlushConsoleInputBuffer
LoadLibraryA
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
FlushFileBuffers
GetFullPathNameA
SetStdHandle
ReadConsoleW
GetTimeZoneInformation
FindFirstFileExA
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
CopyFileA
GetCommandLineW
OutputDebugStringA
SetConsoleMode
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetConsoleMode
GetACP
WriteFile
ExitProcess
ResumeThread
ExitThread
SetConsoleCtrlHandler
WriteConsoleW
ReadFile
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEndOfFile
RtlCaptureStackBackTrace
Sleep
DuplicateHandle
GetDriveTypeW
CreateFileW
GetSystemInfo
HeapValidate
HeapSize
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
FormatMessageW
VirtualQuery
WaitForSingleObjectEx
GetCurrentProcess
GetCurrentThread
GetExitCodeThread
GetNativeSystemInfo
QueryPerformanceFrequency
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
LocalFree
SetEvent
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
VirtualAlloc
VirtualFree
VirtualProtect
SetProcessAffinityMask
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForMultipleObjectsEx
RtlPcToFileHeader
RtlUnwindEx
GetModuleHandleExW
HeapAlloc
user32
GetUserObjectInformationW
GetProcessWindowStation
UnregisterClassA
GetDesktopWindow
MessageBoxW
gdi32
SelectObject
GetDeviceCaps
GetBitmapBits
DeleteObject
DeleteDC
CreateDCW
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetObjectW
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoCreateGuid
CoUninitialize
CoInitialize
oleaut32
SetErrorInfo
VariantClear
SysAllocString
GetErrorInfo
VariantChangeType
VariantInit
SysFreeString
SysStringByteLen
SysAllocStringByteLen
CreateErrorInfo
advapi32
RegisterEventSourceW
DeregisterEventSource
RegCloseKey
RegSetValueExA
RegOpenKeyExA
ReportEventW
shlwapi
PathFileExistsA
rpcrt4
UuidToStringA
RpcStringFreeA
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 688KB - Virtual size: 688KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 154KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ