C:\vmagent_new\bin\joblist\623877\out\Release\sesvcr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_2a853d25b3990a68ace0715816e2ed03_black-basta_hawkeye_luca-stealer.exe
Resource
win7-20240903-en
General
-
Target
2025-03-30_2a853d25b3990a68ace0715816e2ed03_black-basta_hawkeye_luca-stealer
-
Size
520KB
-
MD5
2a853d25b3990a68ace0715816e2ed03
-
SHA1
7fd369dfa2c648a06126f40c1bcbf70590ce1cbf
-
SHA256
1c35cf6d9c6d45d769d5054ba292df89b12decfc15bc578aa5adfdbacd661aaa
-
SHA512
9f9bd7e332498e30160972643ac596c86f1fe3849ee86818ebe63275457f6481c9e1c9c50b41932b6111dbf26f68b5cb5ac70cbebe8faf7a4fbfbdae84a81829
-
SSDEEP
12288:ADtdhbVuzipg+0qis6mlDLTlmneFOCM8LTZcgkA97:ADb9VuUis6mlnTlIeUCM8vZx97
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-30_2a853d25b3990a68ace0715816e2ed03_black-basta_hawkeye_luca-stealer
Files
-
2025-03-30_2a853d25b3990a68ace0715816e2ed03_black-basta_hawkeye_luca-stealer.exe windows:5 windows x86 arch:x86
963df8e0bf221c69c62f01b494729e46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OutputDebugStringW
GetSystemTime
SystemTimeToFileTime
LoadLibraryW
GetTempPathW
GetFileType
SetFilePointer
WriteFile
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileA
LocalFileTimeToFileTime
ProcessIdToSessionId
LocalFree
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
RaiseException
SetLastError
SetThreadAffinityMask
GetCurrentThread
QueryPerformanceCounter
OpenFileMappingW
Sleep
SetEvent
InterlockedCompareExchange
ExitProcess
GetSystemTimeAsFileTime
CreateEventW
CreateMutexW
VirtualFreeEx
ReadFile
InterlockedDecrement
InterlockedIncrement
DecodePointer
GetFileSizeEx
SetFilePointerEx
FormatMessageW
TlsSetValue
HeapLock
ReleaseMutex
HeapWalk
TlsAlloc
TlsGetValue
TlsFree
HeapUnlock
OpenThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetACP
GetStdHandle
GetCommandLineW
GetCommandLineA
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
RtlUnwind
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetStringTypeW
LCMapStringW
EncodePointer
GetCurrentProcess
OpenProcess
Process32NextW
TerminateProcess
lstrcmpiW
Process32FirstW
CreateToolhelp32Snapshot
WaitForSingleObject
CreateThread
HeapDestroy
FindClose
FindNextFileW
FindFirstFileW
SetFileAttributesW
GetLastError
CreateDirectoryW
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
GetModuleHandleW
GetCurrentProcessId
CloseHandle
DeviceIoControl
CreateFileW
DeleteFileW
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
WriteConsoleW
user32
SetWindowPos
GetParent
GetWindowThreadProcessId
PostMessageW
GetMessageW
DefWindowProcW
DestroyWindow
IsWindow
UnregisterClassW
GetWindowLongW
CallWindowProcW
RegisterWindowMessageW
SendMessageW
PostQuitMessage
RegisterClassExW
FindWindowW
GetClassInfoExW
LoadCursorW
CreateWindowExW
GetKeyState
SetFocus
SetParent
KillTimer
SetTimer
CharNextW
PeekMessageW
TranslateMessage
DispatchMessageW
ShowWindow
SetWindowLongW
advapi32
OpenProcessToken
RegQueryValueExA
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
GetTokenInformation
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
GetUserNameW
shell32
SHFileOperationW
CommandLineToArgvW
SHGetFolderPathW
ole32
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocStringLen
SysAllocString
shlwapi
PathIsRootW
PathRemoveFileSpecW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
SHGetValueW
PathAppendW
PathFindFileNameW
ord158
SHDeleteKeyW
PathCombineW
SHSetValueW
StrStrIA
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
Exports
Exports
??0ShellResourceRequestDetails@@QAE@XZ
??1ShellResourceRequestDetails@@QAE@XZ
??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 80KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE