Static task
static1
Behavioral task
behavioral1
Sample
13176afb9ae6667ef40065d3f5357fd334420efbf6eca6ebaf7a94a325667975.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13176afb9ae6667ef40065d3f5357fd334420efbf6eca6ebaf7a94a325667975.exe
Resource
win10v2004-20220812-en
General
-
Target
13176afb9ae6667ef40065d3f5357fd334420efbf6eca6ebaf7a94a325667975.zip
-
Size
1.3MB
-
MD5
2b6dde609bd21186a61f21690de5c59c
-
SHA1
935c039dab52a7fbc72a124ee11472851e1fd16c
-
SHA256
05edba0bf0798fade1b8f16a4f0ac3b712e2b517133d57c8e15104cd51eaec89
-
SHA512
f81b4406f0e06fad91d00a2eb65741175e225d52d2e66d3157672fd78ae762cda77dc4c634301209e5853608055502ae38abc0ecfcb61b41829161f96d415d68
-
SSDEEP
24576:lAIrCEFI3nTsf4QYukva1r+zduJ7QKlNvGcLV0AwBm2WPcIkvACyoIT:y1EIXTsf4QvX1a4J7lN+cLgBgcIYyoIT
Malware Config
Signatures
Files
-
13176afb9ae6667ef40065d3f5357fd334420efbf6eca6ebaf7a94a325667975.zip.zip
Password: infected
-
13176afb9ae6667ef40065d3f5357fd334420efbf6eca6ebaf7a94a325667975.exe.exe windows x86
Password: infected
2c992e7fdb8b880afef063985f04850c
Code Sign
04:5f:da:74:1e:c2:8b:6f:f8:7a:11:00:1c:25:ca:60:e3:a2Certificate
IssuerCN=R3,O=Let's Encrypt,C=USNot Before04/07/2022, 06:13Not After02/10/2022, 06:13SubjectCN=software.com7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12/01/2016, 00:00Not After11/01/2031, 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23/12/2017, 00:00Not After22/03/2029, 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
db:fc:f6:ca:ea:52:8c:92:61:8c:4f:4f:95:e1:26:60:52:71:47:82:15:36:a4:d3:91:d0:89:cc:df:db:ee:29Signer
Actual PE Digestdb:fc:f6:ca:ea:52:8c:92:61:8c:4f:4f:95:e1:26:60:52:71:47:82:15:36:a4:d3:91:d0:89:cc:df:db:ee:29Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=software.com03/09/2022, 00:40 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GlobalFree
SetVolumeLabelW
GetShortPathNameW
GetFileSizeEx
CloseHandle
TerminateThread
GetCurrentThread
GetCurrentThreadId
SuspendThread
CreateThread
InitAtomTable
EraseTape
BuildCommDCBAndTimeoutsW
GetNamedPipeClientComputerNameW
CreateSemaphoreA
GetTapeStatus
VerifyVersionInfoA
SetConsoleCtrlHandler
GetProcAddress
SetWaitableTimer
FindClose
FindVolumeClose
AreFileApisANSI
GetCurrentProcess
GetProcessHeaps
GetLastError
GetDiskFreeSpaceW
GetConsoleCP
GlobalAddAtomA
ExitProcess
GetSystemDirectoryW
EnumResourceLanguagesA
EnumSystemCodePagesW
GetDllDirectoryW
FoldStringW
CreateFileA
SetComputerNameW
GlobalAlloc
DeleteFileA
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
IsDebuggerPresent
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
HeapAlloc
InitializeCriticalSectionAndSpinCount
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualAlloc
HeapReAlloc
HeapSize
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
user32
GetSysColorBrush
MessageBoxW
advapi32
GetFileSecurityW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ