Static task
static1
Behavioral task
behavioral1
Sample
bd6b17c8571da4da97a92f0df0f9b3a025fb6c261a9b9fe017575e82229ce98c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd6b17c8571da4da97a92f0df0f9b3a025fb6c261a9b9fe017575e82229ce98c.exe
Resource
win10v2004-20220812-en
General
-
Target
bd6b17c8571da4da97a92f0df0f9b3a025fb6c261a9b9fe017575e82229ce98c
-
Size
195KB
-
MD5
0bcfb2f4a47dd0c618c4a855350a7f42
-
SHA1
528fdf4e8674331755d01d7646a22b77999f441d
-
SHA256
bd6b17c8571da4da97a92f0df0f9b3a025fb6c261a9b9fe017575e82229ce98c
-
SHA512
d79bd06877b41b5027950b76197ed16e4d5a2753ce2720a6d5f42e61b93ea2a677e1f802052a8d86c4496d7367c270b3d3a9d8dd84330dd5eb52157a02707578
-
SSDEEP
3072:bpzRNYuluupWyvbOijh7UAoaI52pySvl3nW0CWcscGF8ZHmt4qvrBK5GBALR3v/8:bZRvupm9UX5WflXW5Wc88wGUrBlBR
Malware Config
Signatures
Files
-
bd6b17c8571da4da97a92f0df0f9b3a025fb6c261a9b9fe017575e82229ce98c.exe windows x86
a5ef9f2852ce558dde68be7f90b9c3fa
Code Sign
01Certificate
IssuerCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6dNot Before01/08/1996, 00:00Not After31/12/2020, 23:59SubjectCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6d0aCertificate
IssuerCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6dNot Before06/08/2003, 00:00Not After05/08/2013, 23:59SubjectCN=Thawte Code Signing CA,O=Thawte Consulting (Pty) Ltd.,C=ZAExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
5f:fa:04:55:62:ae:a8:df:47:22:5c:a5:26:d8:50:7fCertificate
IssuerCN=Thawte Code Signing CA,O=Thawte Consulting (Pty) Ltd.,C=ZANot Before25/07/2007, 00:00Not After15/09/2009, 23:59SubjectCN=electronic-group,OU=SECURE APPLICATION DEVELOPMENT,O=electronic-group,L=LYON,ST=Rhone,C=FRExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_SetImageCount
ImageList_DragEnter
CreateStatusWindowW
gdi32
GetTextMetricsW
GetTextExtentExPointW
advapi32
AddAccessDeniedAce
SetPrivateObjectSecurity
EnumServicesStatusA
DestroyPrivateObjectSecurity
CryptVerifySignatureA
CryptReleaseContext
CreateProcessAsUserW
CryptGetUserKey
kernel32
ExitProcess
GetTempFileNameA
_lread
PeekConsoleInputW
VirtualAllocEx
GetSystemTimeAsFileTime
IsValidLocale
GetHandleInformation
CancelIo
GetDriveTypeW
GetTickCount
GetCommandLineW
FindFirstFileW
ReadFile
SetMailslotInfo
GetCommConfig
GetSystemDirectoryW
CompareStringW
FlushConsoleInputBuffer
WritePrivateProfileSectionW
GetLargestConsoleWindowSize
FreeLibraryAndExitThread
EnumCalendarInfoA
GetSystemDefaultLangID
IsBadStringPtrA
PulseEvent
GetShortPathNameW
GlobalFlags
user32
GetMessageTime
EnumDisplaySettingsExA
ClientToScreen
SetClipboardViewer
SetWindowRgn
RegisterClassExA
SetDlgItemTextA
GetFocus
GetKeyboardLayout
GetWindowThreadProcessId
SystemParametersInfoW
IsCharUpperA
DeferWindowPos
GetSystemMenu
SetClassLongA
GetWindowTextLengthA
EndDeferWindowPos
GetProcessWindowStation
msvcrt
fgetws
_strtime
wcstod
wcscspn
_sleep
_fdopen
strncat
_wfsopen
iswalpha
_spawnlp
setbuf
isspace
fread
difftime
_mbsicmp
_endthreadex
_wtoi
_mbsinc
_getmbcp
_pctype
fputws
fputs
_mbsncmp
Sections
.text Size: 4KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ