Static task
static1
Behavioral task
behavioral1
Sample
e43e9836966fa45940e9d8c14a3b33168065f3eb4800a293b50d5910dd917f81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e43e9836966fa45940e9d8c14a3b33168065f3eb4800a293b50d5910dd917f81.exe
Resource
win10v2004-20221111-en
General
-
Target
e43e9836966fa45940e9d8c14a3b33168065f3eb4800a293b50d5910dd917f81
-
Size
195KB
-
MD5
3a9bb306b5699a4d709d12e5a5ecd7ef
-
SHA1
66320c0c879b537efff575eb77439628d72e0145
-
SHA256
e43e9836966fa45940e9d8c14a3b33168065f3eb4800a293b50d5910dd917f81
-
SHA512
b711086e272424270e86dd1d95ec97fca2cc9e55ba18f5c0db5e87c86a086b92f44ed473ca8b2e15d2932700c2a8772f35900d1957835898b8a33409991ac0ad
-
SSDEEP
3072:LpzRNYuluupWyvbOijh7UAoaI52pySvl3nW0CWcscGF8ZHmt4qZFqH/Pb3gaanl:LZRvupm9UX5WflXW5Wc88wG0q35a
Malware Config
Signatures
Files
-
e43e9836966fa45940e9d8c14a3b33168065f3eb4800a293b50d5910dd917f81.exe windows x86
a5ef9f2852ce558dde68be7f90b9c3fa
Code Sign
01Certificate
IssuerCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6dNot Before01/08/1996, 00:00Not After31/12/2020, 23:59SubjectCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6d0aCertificate
IssuerCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6dNot Before06/08/2003, 00:00Not After05/08/2013, 23:59SubjectCN=Thawte Code Signing CA,O=Thawte Consulting (Pty) Ltd.,C=ZAExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
5f:fa:04:55:62:ae:a8:df:47:22:5c:a5:26:d8:50:7fCertificate
IssuerCN=Thawte Code Signing CA,O=Thawte Consulting (Pty) Ltd.,C=ZANot Before25/07/2007, 00:00Not After15/09/2009, 23:59SubjectCN=electronic-group,OU=SECURE APPLICATION DEVELOPMENT,O=electronic-group,L=LYON,ST=Rhone,C=FRExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_SetImageCount
ImageList_DragEnter
CreateStatusWindowW
gdi32
GetTextMetricsW
GetTextExtentExPointW
advapi32
AddAccessDeniedAce
SetPrivateObjectSecurity
EnumServicesStatusA
DestroyPrivateObjectSecurity
CryptVerifySignatureA
CryptReleaseContext
CreateProcessAsUserW
CryptGetUserKey
kernel32
ExitProcess
GetTempFileNameA
_lread
PeekConsoleInputW
VirtualAllocEx
GetSystemTimeAsFileTime
IsValidLocale
GetHandleInformation
CancelIo
GetDriveTypeW
GetTickCount
GetCommandLineW
FindFirstFileW
ReadFile
SetMailslotInfo
GetCommConfig
GetSystemDirectoryW
CompareStringW
FlushConsoleInputBuffer
WritePrivateProfileSectionW
GetLargestConsoleWindowSize
FreeLibraryAndExitThread
EnumCalendarInfoA
GetSystemDefaultLangID
IsBadStringPtrA
PulseEvent
GetShortPathNameW
GlobalFlags
user32
GetMessageTime
EnumDisplaySettingsExA
ClientToScreen
SetClipboardViewer
SetWindowRgn
RegisterClassExA
SetDlgItemTextA
GetFocus
GetKeyboardLayout
GetWindowThreadProcessId
SystemParametersInfoW
IsCharUpperA
DeferWindowPos
GetSystemMenu
SetClassLongA
GetWindowTextLengthA
EndDeferWindowPos
GetProcessWindowStation
msvcrt
fgetws
_strtime
wcstod
wcscspn
_sleep
_fdopen
strncat
_wfsopen
iswalpha
_spawnlp
setbuf
isspace
fread
difftime
_mbsicmp
_endthreadex
_wtoi
_mbsinc
_getmbcp
_pctype
fputws
fputs
_mbsncmp
Sections
.text Size: 4KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ