C:\Users\sin\ShieldX\演訓平台\XTEAM\APT\Fin7_CVE-20170199_01\code\ReverseBackdoor\Debug\ReverseBackdoor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b441a3310a165ef62fb0dd59dfc7a821cdc2d3420ac0aff245304ab324e5acae.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b441a3310a165ef62fb0dd59dfc7a821cdc2d3420ac0aff245304ab324e5acae.exe
Resource
win10v2004-20240802-en
General
-
Target
b441a3310a165ef62fb0dd59dfc7a821cdc2d3420ac0aff245304ab324e5acae
-
Size
1.4MB
-
MD5
c490797282edcec9b4f5b8c13e9b2b63
-
SHA1
f674628a98dfde5d5fd797207102265792c37eb0
-
SHA256
b441a3310a165ef62fb0dd59dfc7a821cdc2d3420ac0aff245304ab324e5acae
-
SHA512
5411c1455feea82f528dde9a028fd4d8e27d45d2ff25adb42a22e86017b5693971bcc3b48ea47ee031d70cf789b7589200327d36f8b120068c8b696ff7be5e6d
-
SSDEEP
24576:x27SMCmqyJGK7/ANm8pYS7OLHVxtS+ee:xsHqU7/ANj6Vz8e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b441a3310a165ef62fb0dd59dfc7a821cdc2d3420ac0aff245304ab324e5acae
Files
-
b441a3310a165ef62fb0dd59dfc7a821cdc2d3420ac0aff245304ab324e5acae.exe windows:6 windows x86 arch:x86
4e60da9d6a155ffec07069ce8d5c714b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcessHeap
WaitForSingleObject
CreateMutexA
Sleep
WaitForMultipleObjects
TerminateProcess
CreateThread
CreateProcessA
OpenProcess
GetLocalTime
GetModuleFileNameA
GetModuleHandleW
CopyFileA
WideCharToMultiByte
CreateToolhelp32Snapshot
CreatePipe
Process32NextW
CreateFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetTimeZoneInformation
SetConsoleCtrlHandler
GetLastError
SetHandleInformation
CloseHandle
GetTempFileNameA
GetTempPathA
WriteFile
ReadFile
GetFileAttributesA
GetFileSize
DeleteFileA
CreateFileA
CreateDirectoryA
Process32FirstW
GetCommandLineW
WriteConsoleW
OutputDebugStringW
HeapQueryInformation
HeapSize
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetStdHandle
GetSystemInfo
HeapValidate
GetModuleHandleExW
SetEndOfFile
ExitProcess
FormatMessageA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LocalFree
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
HeapAlloc
HeapFree
VirtualQuery
FreeLibrary
GetProcAddress
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
GetMessageW
DispatchMessageW
GetKeyState
GetSystemMetrics
GetForegroundWindow
GetDC
ReleaseDC
GetWindowTextA
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
TranslateMessage
gdi32
CreateDIBSection
SelectObject
GetCurrentObject
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
GetObjectW
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
shell32
ShellExecuteA
SHGetKnownFolderPath
CommandLineToArgvW
shlwapi
PathStripPathA
wininet
HttpSendRequestExA
InternetConnectA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetWriteFile
HttpEndRequestA
InternetOpenA
ws2_32
WSAGetLastError
WSACleanup
gethostname
gethostbyname
WSAConnect
closesocket
htons
inet_addr
inet_ntoa
WSAStartup
send
WSASocketA
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ