Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
1.6MB
-
MD5
c2d5c19230aaebf428fb2903f7e51281
-
SHA1
719fa48681d40483dc1078935364d129a211408a
-
SHA256
38e38a0cc862faabc4541f45f2dfb6001fe69fc49313a06aa3c578685f3de29f
-
SHA512
9ee1ad0c0102fad3aebc2c8b03f8f67ced5138f3229e03a1bd8fc7d5baa346453d8100788a8aff94e2c12e9fc164c933e2bacffc4cac76292481ce912ff56417
-
SSDEEP
24576:iccz1y8Kvgk4SgRSY0zKa4pBIK4ThUarjJgLewogoXforKb6vuIOAxVZrN6EVKSM:iccJy8KvgSXY0+FQekJgrNoXgrl+YM
Malware Config
Signatures
Files
-
file.exe.exe windows x86
1e730ae50817d7515d935e3a71c7d69a
Code Sign
04:18:b6:6b:76:51:00:77:b2:0a:65:31:85:56:0b:c9Certificate
IssuerCN=DigiCert Global G2 TLS RSA SHA256 2020 CA1,O=DigiCert Inc,C=USNot Before24/05/2022, 00:00Not After09/06/2023, 23:59SubjectCN=zephyranywhere.com,O=Medtronic\, Inc,L=Minneapolis,ST=Minnesota,C=US7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12/01/2016, 00:00Not After11/01/2031, 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23/12/2017, 00:00Not After22/03/2029, 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
2a:57:23:f3:1b:cc:66:1d:51:dd:c7:84:44:d8:4d:db:c1:97:57:23:5a:42:cd:7d:7d:8a:76:7c:ec:58:b3:14Signer
Actual PE Digest2a:57:23:f3:1b:cc:66:1d:51:dd:c7:84:44:d8:4d:db:c1:97:57:23:5a:42:cd:7d:7d:8a:76:7c:ec:58:b3:14Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=zephyranywhere.com,O=Medtronic\, Inc,L=Minneapolis,ST=Minnesota,C=US12/09/2022, 13:19 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
GetModuleHandleW
LoadLibraryW
GlobalFree
Sleep
ResumeThread
CloseHandle
SuspendThread
CreateThread
WaitForDebugEvent
SetHandleCount
GetCurrentConsoleFontEx
SetLastError
SetConsoleCursorPosition
GetSystemDirectoryA
GetFullPathNameW
DeleteFiber
SetFileApisToOEM
SwitchToThread
GetConsoleOriginalTitleW
GetProcAddress
GetProcessWorkingSetSize
GetConsoleAliasExesLengthW
GetConsoleAliasesLengthW
GetTickCount
GetLastError
SetCommMask
GetProcessHeaps
GetFileSizeEx
FindClose
ReadConsoleA
GetFileBandwidthReservation
ExitProcess
GlobalFix
DeleteAtom
SetComputerNameExW
CreateFileA
SetStdHandle
GetNamedPipeAttribute
GlobalAlloc
HeapFree
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapReAlloc
GetStartupInfoW
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
ClientToScreen
WaitForInputIdle
MessageBoxW
advapi32
ReadEventLogW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bobr Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lbobr Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mbobr Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ