DllGetClassObject
DllRegisterServer
DllUnregisterServer
ebsbqoV
Behavioral task
behavioral1
Sample
Incident_Report_Harassment.doc
Resource
win10-20240404-en
Target
2024-04-18-SSLoad-and-Cobalt-Strike-malware-and-artifacts.zip
Size
5.3MB
MD5
30b590347982e79f8af515d7f2e49ad7
SHA1
bca3f7a21b3444678b7c37831a311f0e1e172bb3
SHA256
4223688925e083fbc1fb17daf06664bd64a7ddc3db30cdc67cafbe6133567cbb
SHA512
9ccfa852d7685c115669a3270c959b9474d3256c98d4074a20f0d9209226e638e3ae12ba6375c24b64f2e1734b8661593c761ee4f76cf077b3ca00eaf143b71a
SSDEEP
98304:Kbrqq6Ubf2zDlX3hEXsfsKfYjx7sLinqMlaMAi6Ptbgk2MFuh3XJTUit1JhZq5VQ:KD+DlXxISxEx70oqLi6PJPFuNX2iDXwM
resource |
---|
static1/unpack001/Incident_Report_Harassment.doc |
Checks for missing Authenticode signature.
resource |
---|
unpack001/2024-04-18-CobaltStrike-DLL.bin |
unpack001/2024-04-18-SSLoad-DLL.bin |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
RtlCaptureContext
RtlUnwindEx
NtWriteFile
NtReadFile
RtlNtStatusToDosError
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlPcToFileHeader
SystemFunction036
BCryptGenRandom
HeapSize
WriteFile
GetConsoleOutputCP
GetStringTypeW
SetStdHandle
WaitForMultipleObjects
GetCurrentProcessId
GetCurrentThreadId
GetCurrentThread
SetThreadPriority
Sleep
CloseHandle
FreeConsole
ReleaseSRWLockExclusive
FreeEnvironmentStringsW
DeleteProcThreadAttributeList
CompareStringOrdinal
GetLastError
SetThreadStackGuarantee
CreateWaitableTimerExW
SetWaitableTimer
WaitForSingleObject
QueryPerformanceCounter
AcquireSRWLockExclusive
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetCurrentProcess
GetCommandLineW
FlushFileBuffers
SetFileInformationByHandle
DuplicateHandle
SetFilePointerEx
GetStdHandle
SetHandleInformation
WriteFileEx
SleepEx
GetExitCodeProcess
TerminateProcess
TryAcquireSRWLockExclusive
HeapFree
HeapReAlloc
AcquireSRWLockShared
ReleaseSRWLockShared
ReleaseMutex
GetModuleHandleA
GetProcAddress
GetProcessHeap
HeapAlloc
FindNextFileW
FindClose
CreateFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
CreateDirectoryW
FindFirstFileW
GetFinalPathNameByHandleW
CreateEventW
ReadFile
GetOverlappedResult
CancelIo
GetConsoleMode
GetFileType
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
SetCurrentDirectoryW
ExitProcess
CreateNamedPipeW
ReadFileEx
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
CreateThread
GetFullPathNameW
GetSystemTimeAsFileTime
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetModuleHandleExW
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
EncodePointer
InterlockedFlushSList
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
connect
getaddrinfo
WSASocketW
send
recv
WSAGetLastError
freeaddrinfo
WSACleanup
WSAStartup
closesocket
DllGetClassObject
DllRegisterServer
DllUnregisterServer
ebsbqoV
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
C:\vmagent_new\bin\joblist\500965\out\Release\MenuEx.pdb
WNetGetConnectionW
FindClose
FindFirstFileW
FlushFileBuffers
GetFileAttributesW
GetLongPathNameW
GetTempFileNameW
WriteFile
GetTempPathW
CloseHandle
WaitForSingleObject
OpenMutexW
Sleep
GetExitCodeProcess
CreateThread
GetExitCodeThread
CreateProcessW
GetSystemInfo
GetVersion
GetVersionExW
FindResourceExW
FreeResource
GetModuleHandleA
LockResource
LoadLibraryW
InitializeCriticalSectionAndSpinCount
DeleteFileW
GlobalLock
GlobalFree
MulDiv
lstrcmpiA
lstrcpynA
lstrcpynW
lstrlenW
GetPrivateProfileStringW
WideCharToMultiByte
OutputDebugStringW
GetFileType
GetFileInformationByHandle
GetDriveTypeW
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
GetSystemDirectoryW
GetTickCount
DeviceIoControl
SetLastError
GetFullPathNameW
LCMapStringW
InterlockedFlushSList
RtlUnwind
InitializeSListHead
GetSystemTimeAsFileTime
CreateFileW
MultiByteToWideChar
lstrcmpiW
FindResourceW
SizeofResource
LoadResource
LoadLibraryExW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
DisableThreadLibraryCalls
GlobalUnlock
DeleteCriticalSection
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
AreFileApisANSI
GlobalAlloc
PeekNamedPipe
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FormatMessageW
IsDebuggerPresent
SystemParametersInfoW
LoadStringW
WaitForInputIdle
GetSystemMetrics
InsertMenuW
SetMenuItemBitmaps
InsertMenuItemW
DrawTextW
GetDC
ReleaseDC
GetSysColor
FindWindowW
LoadImageW
CharNextW
UnregisterClassW
SetDIBits
GetDIBits
ExtTextOutW
GetObjectW
SetTextColor
SetBkMode
SetBkColor
SelectObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateFontIndirectW
CreateCompatibleDC
RegQueryValueExW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
SystemFunction036
ImpersonateSelf
RevertToSelf
ShellExecuteExW
DragQueryFileW
ReleaseStgMedium
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
LoadTypeLi
SysFreeString
RegisterTypeLi
UnRegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysStringLen
SysAllocString
PathAppendW
SHGetValueW
PathFileExistsW
SHDeleteKeyW
AlphaBlend
GdipDrawImageRectI
GdipSetInterpolationMode
GdipSetPixelOffsetMode
GdiplusShutdown
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipAlloc
GdipFree
GdiplusStartup
GdipCloneImage
wcsncmp
memmove
strlen
fclose
setlocale
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@XZ
??0exception@@QAE@ABQBD@Z
_cexit
_amsg_exit
__getmainargs
__wgetmainargs
_environ
_wenviron
atexit
_initterm
__CxxFrameHandler
__DestructExceptionObject
?raw_name@type_info@@QBEPBDXZ
_wcslwr
__pctype_func
_iob
_wgetenv
_wputenv
__doserrno
atof
getenv
_putenv
getwc
_wfopen
_wfreopen
_wtmpnam
__wcserror
_strerror
_wasctime
_wctime64
asctime
_ctime64
_gmtime64
_localtime64
_mktime64
_waccess
_wfindfirst64
_wfindnext64
_wsopen
_access
atoi
_findfirst64
_findnext64
_lseeki64
_sopen
clearerr
fgetpos
??_U@YAPAXI@Z
fread
??3@YAXPAX@Z
fsetpos
getc
tmpnam
___lc_codepage_func
_Getdays
_Getmonths
_Strftime
_fstat64
_ftime64
_lock
_unlock
_assert
wcscmp
_dstbias
_timezone
_tzname
_sys_errlist
_sys_nerr
tolower
___mb_cur_max_func
wcstol
strtol
localeconv
abort
_CxxThrowException
wcslen
wcspbrk
_wfullpath
_getdrive
wcsstr
memset
memcpy
__dllonexit
_itow
_ltow
_ultow
_i64tow
_ui64tow
_wsplitpath
_wsearchenv
_itoa
_ltoa
_ultoa
_i64toa
_ui64toa
_ecvt
_fcvt
_gcvt
_splitpath
_searchenv
_controlfp
_control87
_wmktemp
_chsize
_mktemp
_wstrtime
_strtime
tmpfile
_cgets
_cgetws
_XcptFilter
_pwctype
__lc_collate_cp
_isatty
fflush
_fileno
mbtowc
wctomb
___lc_handle_func
strrchr
iswctype
wcsrchr
_CIlog10
ceil
_clearfp
?terminate@@YAXXZ
_msize
realloc
_wctime
ctime
gmtime
localtime
_ftime
memcmp
_daylight
malloc
free
_errno
??_V@YAXPAX@Z
??2@YAPAXI@Z
fputc
fwrite
fputwc
wcschr
freopen
fopen
_umask
_wcsicmp
RtlAdjustPrivilege
RtlNtStatusToDosError
RtlDetermineDosPathNameType_U
RtlDosPathNameToNtPathName_U
RtlFreeUnicodeString
NtCreateFile
NtSetInformationFile
NtClose
mbsrtowcs
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.