Static task
static1
Behavioral task
behavioral1
Sample
e80aa4d7b4ead644f3e9b9a17a0683ebcb72bc852c6c034fb0ea23a08fa61a44.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e80aa4d7b4ead644f3e9b9a17a0683ebcb72bc852c6c034fb0ea23a08fa61a44.exe
Resource
win10v2004-20220901-en
General
-
Target
e80aa4d7b4ead644f3e9b9a17a0683ebcb72bc852c6c034fb0ea23a08fa61a44
-
Size
224KB
-
MD5
062ca31f5d11475347946477852f9f23
-
SHA1
81970f88ddf11ee144ba368ec4e44f352e5139fe
-
SHA256
e80aa4d7b4ead644f3e9b9a17a0683ebcb72bc852c6c034fb0ea23a08fa61a44
-
SHA512
ec8011f16c5973d1352c8f6b302b3eb6af093a3ab67b9d953a7d4797f43dfcc4dbf89b26ba683e7fa3a349fb4d2b863a37218c9e7904d5e4915e57dc44726b9e
-
SSDEEP
6144:Io/3Nr7Zjsx8Is2EXbIh0HY2yp2IVVhc0Ru3MtyBb+:Io/9rxUJs2ELIeolc6uqma
Malware Config
Signatures
Files
-
e80aa4d7b4ead644f3e9b9a17a0683ebcb72bc852c6c034fb0ea23a08fa61a44.exe windows x86
563a03b7e7a6a418b60b527f0c49e656
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29-01-1996 00:00Not After01-08-2028 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15-06-2007 00:00Not After14-06-2012 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04-12-2003 00:00Not After03-12-2013 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20-01-2010 00:00Not After24-01-2012 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21-05-2009 00:00Not After20-05-2019 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
65:d4:71:f3:ce:a0:d2:dd:23:2f:04:7c:9a:fe:f4:5a:1a:5e:e9:6fSigner
Actual PE Digest65:d4:71:f3:ce:a0:d2:dd:23:2f:04:7c:9a:fe:f4:5a:1a:5e:e9:6fDigest Algorithmsha1PE Digest MatchesfalseSignature Validations
TrustedfalseVerification
Signing CertificateCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=US07-05-2010 16:02 Valid: false
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCalendarInfoW
GetProcessHeaps
FatalAppExitW
LoadLibraryA
OpenMutexA
GetModuleHandleA
LoadLibraryA
GetModuleFileNameA
CreateMutexA
lstrlenW
SearchPathW
OpenWaitableTimerA
MoveFileW
GetCPInfo
InitializeCriticalSection
TlsAlloc
GetSystemDefaultLCID
GetLocaleInfoW
GetTempPathW
GetDiskFreeSpaceA
DisconnectNamedPipe
GetLocalTime
DeleteAtom
GetTempPathA
RemoveDirectoryW
GetCurrentThreadId
CreateMutexW
GetACP
lstrcatW
SearchPathA
WaitForSingleObject
RemoveDirectoryA
GetProcAddress
GetSystemDefaultLangID
GetThreadLocale
IsBadReadPtr
GetLongPathNameA
lstrcpy
GetNumberFormatW
GetVolumeInformationW
SetEvent
GetCalendarInfoA
GetWindowsDirectoryW
OpenEventA
AddAtomA
SleepEx
WinExec
lstrcmpA
GetDateFormatA
GetSystemInfo
CreateSemaphoreW
MulDiv
user32
GetFocus
SendMessageW
CharNextW
AppendMenuW
MessageBoxW
UnregisterClassA
MessageBeep
LoadIconW
SetParent
GetMenuItemCount
WinHelpA
CreateWindowExW
CreateDialogIndirectParamW
GetMessageW
CreateDesktopA
UpdateLayeredWindow
LoadBitmapA
SetWindowTextW
InsertMenuItemW
SetTimer
EnumClipboardFormats
FindWindowW
RegisterWindowMessageA
WaitMessage
GetActiveWindow
InsertMenuItemA
CheckMenuItem
DestroyIcon
gdi32
RemoveFontResourceExA
CreateEllipticRgn
CreatePolygonRgn
CreateMetaFileW
GetRasterizerCaps
RemoveFontResourceW
AddFontResourceA
SetMetaFileBitsEx
CreateMetaFileA
DeleteObject
CreatePen
shell32
SHGetDataFromIDListA
shlwapi
PathIsUNCW
PathRemoveExtensionW
SHRegDeleteEmptyUSKeyW
PathMakeSystemFolderA
PathIsSameRootA
PathMakePrettyW
SHCreateShellPalette
PathGetArgsW
StrTrimA
UrlUnescapeW
StrToInt64ExA
SHDeleteEmptyKeyW
ole32
CoGetPSClsid
CoInitialize
CoGetMalloc
CoFileTimeNow
CLSIDFromProgID
setupapi
pSetupRealloc
CM_Get_Device_Interface_List_ExA
SetupUninstallOEMInfA
SetupRemoveFromDiskSpaceListA
CM_Disable_DevNode_Ex
CM_Create_DevNodeW
SetupFindNextMatchLineA
SetupDiInstallClassA
ExtensionPropSheetPageProc
CM_Query_Resource_Conflict_List
oledlg
OleUIInsertObjectA
OleUIChangeSourceW
Sections
.Fm Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vWFW Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rcVZig Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.eK Size: 2KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.LTeP Size: 3KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 2KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vav Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BexJ Size: 12KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ