Static task
static1
Behavioral task
behavioral1
Sample
a35d2edcc632655cfd6e11a6e08f8380b1ade524335e6c4d9f12280842e615f6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a35d2edcc632655cfd6e11a6e08f8380b1ade524335e6c4d9f12280842e615f6.exe
Resource
win10v2004-20221111-en
General
-
Target
a35d2edcc632655cfd6e11a6e08f8380b1ade524335e6c4d9f12280842e615f6
-
Size
409KB
-
MD5
73b3b714a0b9012e91567259367b8283
-
SHA1
7047287cbe979cc4cfbf03fa3585562ae7546b1c
-
SHA256
a35d2edcc632655cfd6e11a6e08f8380b1ade524335e6c4d9f12280842e615f6
-
SHA512
c11506d1a1a3bcca81a775aa206e8b916241ac527e5d75a0cf8a07063b4bc115ab1aa5882a3d22fe7ac33f2ae2378b78198931737ffda54d764a97c704228d7d
-
SSDEEP
3072:RJ9Tvu0g6k+CnmmupoTmRf9lwVEzYsgfMebXTbAGR2WhzmWM4a0OlJ/BPcjiTacZ:RXvwVE0sgjRrzmWjLOx0UK0
Malware Config
Signatures
Files
-
a35d2edcc632655cfd6e11a6e08f8380b1ade524335e6c4d9f12280842e615f6.exe windows x86
d1756df3b20d1806a20d730758a74f42
Code Sign
01Certificate
IssuerOU=VAD,O=VAD,L=ASD,ST=AF,C=GFNot Before05/11/2014, 00:45Not After04/11/2016, 00:45SubjectOU=Lestrust,O=LesTrast Import Softwares Ltd.,L=Concan,ST=Estate Real,C=GAc2:8a:8d:5d:af:a4:1a:44:ff:c1:02:19:1e:0e:ea:ef:d4:4f:bf:74Signer
Actual PE Digestc2:8a:8d:5d:af:a4:1a:44:ff:c1:02:19:1e:0e:ea:ef:d4:4f:bf:74Digest Algorithmsha1PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateOU=Lestrust,O=LesTrast Import Softwares Ltd.,L=Concan,ST=Estate Real,C=GA24/11/2022, 14:54 Valid: false
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CryptAcquireContextA
CryptGenRandom
kernel32
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
GetCommandLineA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
InitializeCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
TlsGetValue
VirtualProtect
VirtualQuery
WaitForMultipleObjects
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
calloc
free
fwrite
rand
signal
srand
time
vfprintf
user32
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetAsyncKeyState
GetClientRect
GetCursorPos
GetDesktopWindow
GetMessageA
GetWindowRect
LoadCursorA
LoadIconA
PostQuitMessage
RegisterClassExA
SendMessageA
SetWindowPos
ShowWindow
TranslateMessage
Sections
Size: 5KB - Virtual size: 5KB
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 280B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 130KB - Virtual size: 130KB
IMAGE_SCN_MEM_READ