Static task
static1
Behavioral task
behavioral1
Sample
6a2fb8768c039639a9994f0db8297d233307134a489e81c4238b00b16577d3d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a2fb8768c039639a9994f0db8297d233307134a489e81c4238b00b16577d3d2.exe
Resource
win10v2004-20220812-en
General
-
Target
6a2fb8768c039639a9994f0db8297d233307134a489e81c4238b00b16577d3d2
-
Size
92KB
-
MD5
6bca049f5daf4dc3769a3f53b7240180
-
SHA1
553909486e414ceb85db59ef678cfec1afdfc313
-
SHA256
6a2fb8768c039639a9994f0db8297d233307134a489e81c4238b00b16577d3d2
-
SHA512
1d3ef863f1ab7250ceb5227828e94a11b04fe3db92c358c267d4539067443a43522904857d56fab491d8443ff3470fdebef211890870764a905196bcc5893d39
-
SSDEEP
1536:34EQBVufJ7FewDSofbx6LEDCaLog26YEklua5RCGa2rCVisKldRu:5Q4DDMdEkYa5EP21Vu
Malware Config
Signatures
Files
-
6a2fb8768c039639a9994f0db8297d233307134a489e81c4238b00b16577d3d2.exe windows x86
65d750f05545e537e6efb737c9b8280e
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
2f:63:04:0f:94:b3:30:a5:3b:38:b5:ea:6d:a2:36:1cCertificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before18/09/2009, 00:00Not After14/03/2010, 23:59SubjectCN=Andrea Electronics,OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Andrea Digital,O=Andrea Electronics,L=MELVILLE,ST=New York,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
a0:21:38:2b:79:c3:4c:7d:4c:c4:cf:d7:35:ed:22:64:c6:34:6a:e2Signer
Actual PE Digesta0:21:38:2b:79:c3:4c:7d:4c:c4:cf:d7:35:ed:22:64:c6:34:6a:e2Digest Algorithmsha1PE Digest MatchesfalseSignature Validations
TrustedfalseVerification
Signing CertificateCN=Andrea Electronics,OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Andrea Digital,O=Andrea Electronics,L=MELVILLE,ST=New York,C=US18/11/2009, 01:15 Valid: false
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegisterEventSourceA
ReportEventA
DeregisterEventSource
CreateServiceA
ControlService
QueryServiceStatus
DeleteService
InitializeSecurityDescriptor
ConvertStringSecurityDescriptorToSecurityDescriptorA
kernel32
SetFilePointer
GetModuleHandleA
GetModuleFileNameA
lstrlenA
SetEvent
WaitForSingleObject
CloseHandle
Sleep
WriteFile
CreateFileA
GetLastError
CreateEventA
WaitForMultipleObjects
GetLocalTime
GetDateFormatA
GetTimeFormatA
MultiByteToWideChar
SetConsoleCtrlHandler
FormatMessageA
LocalFree
LoadLibraryA
GetProcAddress
CreateNamedPipeA
ResetEvent
ConnectNamedPipe
ReadFile
GetOverlappedResult
DisconnectNamedPipe
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
FlushFileBuffers
WriteConsoleW
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetCommandLineA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapSize
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStdHandle
InitializeCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE