Static task
static1
Behavioral task
behavioral1
Sample
61f1b06b73a729c55560ae5851679c5285b039e4ad81a442e38621512974a90d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
61f1b06b73a729c55560ae5851679c5285b039e4ad81a442e38621512974a90d.exe
Resource
win10v2004-20220812-en
General
-
Target
61f1b06b73a729c55560ae5851679c5285b039e4ad81a442e38621512974a90d
-
Size
129KB
-
MD5
042bfa2fa1501aa61dc9cb822b8425c3
-
SHA1
95778be48ea7cdeee311b63eaa1e9da9118eb9ae
-
SHA256
61f1b06b73a729c55560ae5851679c5285b039e4ad81a442e38621512974a90d
-
SHA512
03497c587a35e5bba2e689f5f7846aced9522e6f7ab8fa59d7843feebfe4cbbc5be4c876f00ca9034f384040b94b644631ca5b652ed4138e1d2af000bc2c9c87
-
SSDEEP
3072:kMacqOtNWRF1vgKo3tyQOZKnOwPwM0W4h7u6MjsBXPfpmwq3cF1V:573u1Ro3ZpnNqW4hyShL
Malware Config
Signatures
Files
-
61f1b06b73a729c55560ae5851679c5285b039e4ad81a442e38621512974a90d.exe windows x86
ee154e55ed043164b8ead13800d70192
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wintrust
TrustDecode
WTHelperProvDataFromStateData
CryptSIPVerifyIndirectData
WTHelperGetFileName
WintrustRemoveActionID
SoftpubInitialize
CryptCATPutMemberInfo
DriverCleanupPolicy
WintrustSetRegPolicyFlags
WVTAsn1SpcSpOpusInfoDecode
mscat32DllUnregisterServer
WTHelperIsInRootStore
WTHelperGetAgencyInfo
CryptSIPGetSignedDataMsg
WVTAsn1SpcMinimalCriteriaInfoEncode
TrustIsCertificateSelfSigned
CryptCATStoreFromHandle
mssip32DllRegisterServer
WVTAsn1SpcLinkEncode
CryptCATEnumerateMember
CryptSIPPutSignedDataMsg
WVTAsn1SpcIndirectDataContentDecode
CryptCATCDFEnumMembers
HTTPSCertificateTrust
CryptCATAdminEnumCatalogFromHash
SoftpubCheckCert
DriverFinalPolicy
WintrustGetRegPolicyFlags
WTHelperOpenKnownStores
CryptCATEnumerateAttr
CryptCATAdminReleaseCatalogContext
CryptCATAdminReleaseContext
MsCatFreeHashTag
kernel32
OpenJobObjectA
SetConsoleMenuClose
CreateTimerQueue
DeactivateActCtx
GetThreadLocale
SetEnvironmentVariableA
SetConsoleNumberOfCommandsW
LZOpenFileW
GetNumaAvailableMemoryNode
SetConsoleOutputCP
GetPrivateProfileSectionW
FindFirstVolumeW
LoadLibraryA
GetConsoleInputWaitHandle
GetNumberOfConsoleMouseButtons
GetConsoleAliasExesA
RegisterWaitForInputIdle
UTUnRegister
AddVectoredExceptionHandler
SetCommMask
FindVolumeClose
BaseCheckAppcompatCache
GetProcessTimes
LocalUnlock
EnumDateFormatsA
PostQueuedCompletionStatus
Beep
OutputDebugStringW
FindCloseChangeNotification
_hwrite
AreFileApisANSI
GlobalFindAtomA
PrivCopyFileExW
GetConsoleNlsMode
GetConsoleInputExeNameA
RemoveDirectoryW
GetPrivateProfileStringW
GetNumberFormatW
SetLocalPrimaryComputerNameA
MoveFileWithProgressW
BaseFlushAppcompatCache
OpenEventA
GetNumberOfConsoleInputEvents
VirtualAlloc
FlushConsoleInputBuffer
CreateFileMappingA
CmdBatNotification
CreateJobObjectW
ExitProcess
CreateWaitableTimerA
SetConsoleActiveScreenBuffer
RemoveLocalAlternateComputerNameW
FreeEnvironmentStringsW
GetProcessWorkingSetSize
SetCommTimeouts
SetHandleContext
HeapCompact
SetSystemPowerState
GetModuleHandleA
LocalLock
gdi32
RemoveFontMemResourceEx
EngAcquireSemaphore
CloseFigure
DdEntry17
StretchDIBits
GdiGradientFill
EndDoc
DdEntry20
DdEntry39
GetStretchBltMode
WidenPath
ExtTextOutA
DdEntry0
GdiAddGlsBounds
GetRegionData
SetBkMode
GdiPlayJournal
GdiEntry16
EnumFontFamiliesW
GetGlyphOutlineA
ResizePalette
GetWindowOrgEx
CreateEllipticRgn
GetStockObject
CLIPOBJ_ppoGetPath
EngCreatePalette
GetCharWidthI
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ