Static task
static1
Behavioral task
behavioral1
Sample
dc0999f7753f4c91efc2d447b8901a8f759e062698aedc49a71a17eb457169e9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc0999f7753f4c91efc2d447b8901a8f759e062698aedc49a71a17eb457169e9.exe
Resource
win10v2004-20221111-en
General
-
Target
dc0999f7753f4c91efc2d447b8901a8f759e062698aedc49a71a17eb457169e9
-
Size
257KB
-
MD5
6e0e0adfeb09682f70a92d01cbf9f8f0
-
SHA1
a498fd5ab585f814293a34b4e3db71f040f4ccd2
-
SHA256
dc0999f7753f4c91efc2d447b8901a8f759e062698aedc49a71a17eb457169e9
-
SHA512
125383a6d9945cb87bd223ca5023f0bd371621fdb6ae274150c6b904efa959f1b49e36acf12d2997dbea4e0dfeff1c739841dead2ed61872f8a166c5c0564b6c
-
SSDEEP
6144:iGYcM8+bBo3H/3NnufJKLuu3Iy6iDx0kJ9xTSDq6OIBHHyIs:N3+a3/9nufu3IsuYv+qwNSIs
Malware Config
Signatures
Files
-
dc0999f7753f4c91efc2d447b8901a8f759e062698aedc49a71a17eb457169e9.exe windows x86
f2d8f639d7304b1b9df3672caef649e2
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20/01/2010, 00:00Not After24/01/2012, 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1a:1d:6b:92:17:ff:bb:07:01:b9:40:a8:11:c2:68:1e:c0:53:b7:4bSigner
Actual PE Digest1a:1d:6b:92:17:ff:bb:07:01:b9:40:a8:11:c2:68:1e:c0:53:b7:4bDigest Algorithmsha1PE Digest MatchesfalseSignature Validations
TrustedfalseVerification
Signing CertificateCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=US07/05/2010, 16:02 Valid: false
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetSystemDirectoryW
GetCommandLineA
GetThreadLocale
RemoveDirectoryA
IsValidLocale
GlobalGetAtomNameW
CompareFileTime
GetExpandedNameW
lstrlenA
GetDateFormatW
GetEnvironmentVariableW
CreateNamedPipeA
GetCurrentProcessId
SetCalendarInfoA
OpenMutexW
GetThreadPriority
lstrcpynW
GetWindowsDirectoryW
FreeLibrary
RaiseException
lstrcpyW
GetVolumeInformationA
GetProcAddress
WaitForSingleObject
OpenFile
lstrcpy
GetCurrentProcess
FindResourceW
GetCalendarInfoW
AddAtomA
CreateMutexW
GetModuleHandleA
DeleteAtom
WinExec
OpenEventA
GetStringTypeW
user32
IsMenu
UnregisterClassA
CharLowerA
SetFocus
FrameRect
GetCapture
MoveWindow
CopyIcon
GetDlgItem
GetClassInfoExW
InsertMenuA
CreateMenu
GetDCEx
PeekMessageA
GetSysColorBrush
SetWindowLongW
EnableMenuItem
GetScrollPos
CheckDlgButton
EnumWindows
CallWindowProcA
GetKeyboardType
PostMessageA
mouse_event
GetCapture
GetIconInfo
GetClassLongA
GetActiveWindow
GetMenuState
GetCaretPos
GetClassInfoW
FillRect
SendMessageW
SetWindowLongA
SetMenu
InsertMenuItemW
DialogBoxIndirectParamA
ClientToScreen
GetDC
GetSysColor
SetDlgItemInt
DefDlgProcW
GetClassInfoExA
SetCursorPos
MonitorFromWindow
SetParent
gdi32
ResetDCW
GetBrushOrgEx
WidenPath
CreateDIBPatternBrushPt
GetPolyFillMode
EndPage
CopyEnhMetaFileA
GetClipBox
EnumFontFamiliesA
Chord
GetTextExtentPointA
IntersectClipRect
GetGlyphOutlineW
GetMapMode
CreatePolyPolygonRgn
advapi32
RegQueryValueW
OpenServiceA
RegDeleteValueW
OpenSCManagerA
RegCreateKeyExW
oleaut32
VarI1FromR4
VarBoolFromUI4
VarUI4FromStr
VarCyInt
SetOaNoCache
CreateErrorInfo
VarBstrFromI2
opengl32
glGetMapfv
glTexCoord1dv
glClearDepth
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.WF Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bzAm Size: 2KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dClRx Size: 3KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Rzvt Size: 2KB - Virtual size: 965B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.j Size: 1024B - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gxBM Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PrUIC Size: 1024B - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aqDGK Size: 1024B - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ