Static task
static1
Behavioral task
behavioral1
Sample
07c99b2c1f723bdb362eb0b860fbd164d35f4ffa9e5dee2f23fdfff92d3b25a6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07c99b2c1f723bdb362eb0b860fbd164d35f4ffa9e5dee2f23fdfff92d3b25a6.dll
Resource
win10v2004-20221111-en
General
-
Target
07c99b2c1f723bdb362eb0b860fbd164d35f4ffa9e5dee2f23fdfff92d3b25a6
-
Size
510KB
-
MD5
29db0c01d8622b8b6a8f2c6a353a3181
-
SHA1
3c1ff4a0a2b0e0de5c02ee7edf1aa6a743774a12
-
SHA256
07c99b2c1f723bdb362eb0b860fbd164d35f4ffa9e5dee2f23fdfff92d3b25a6
-
SHA512
dc99df759c9ef5c59b5bc87d7b12980becf949722573cb7d32569180c51c57caaf762d06535b12b168d2b14d6c743feeea03b4e986b34642a585e68a258ea484
-
SSDEEP
6144:Qb27GD4YOFpbnidE7GD4YO37ZlS0t7GD4YO2ao0yEcMK3N+FT9Z:Qb2fFpbnidEf37ZlS0tf2ao0ys0NYT9Z
Malware Config
Signatures
Files
-
07c99b2c1f723bdb362eb0b860fbd164d35f4ffa9e5dee2f23fdfff92d3b25a6.dll windows x86
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
41:91:a1:5a:39:78:df:cf:49:65:66:38:1d:4c:75:c2Certificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before16/07/2004, 00:00Not After15/07/2014, 23:59SubjectCN=VeriSign Class 3 Code Signing 2004 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)04,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
57:64:6e:2b:55:00:23:d4:90:53:4a:55:3e:ab:0d:0aCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before16/07/2004, 00:00Not After15/07/2009, 23:59SubjectCN=VeriSign Class 3 Code Signing 2004 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)04,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7c:77:8f:22:eb:93:3a:28:79:c9:0b:a2:ec:17:18:f5Certificate
IssuerCN=VeriSign Class 3 Code Signing 2004 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)04,O=VeriSign\, Inc.,C=USNot Before30/11/2006, 00:00Not After20/10/2008, 23:59SubjectCN=Codejock Technologies\, LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Codejock Software,O=Codejock Technologies\, LLC,L=Owosso,ST=Michigan,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
76:e0:e3:e0:55:37:4f:6d:ab:b7:59:2a:fb:b3:0f:54:22:bf:c7:2aSigner
Actual PE Digest76:e0:e3:e0:55:37:4f:6d:ab:b7:59:2a:fb:b3:0f:54:22:bf:c7:2aDigest Algorithmsha1PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Codejock Technologies\, LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Codejock Software,O=Codejock Technologies\, LLC,L=Owosso,ST=Michigan,C=US24/11/2022, 14:54 Valid: false
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.rsrc Size: 502KB - Virtual size: 501KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ