Static task
static1
Behavioral task
behavioral1
Sample
b4e3f0a619b81522576160f3b59fa3a8a85d93370141db1eee3d6bcb43ffd431.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b4e3f0a619b81522576160f3b59fa3a8a85d93370141db1eee3d6bcb43ffd431.exe
Resource
win10v2004-20220901-en
General
-
Target
b4e3f0a619b81522576160f3b59fa3a8a85d93370141db1eee3d6bcb43ffd431
-
Size
224KB
-
MD5
b4af0ca95c5e5b23888859498261f4d2
-
SHA1
6670781cf83a24a6d4476a85b3f3f84a9c5801a8
-
SHA256
b4e3f0a619b81522576160f3b59fa3a8a85d93370141db1eee3d6bcb43ffd431
-
SHA512
5a5e7793852affd878ebf91366705d9c5464aecf89371ed21cea0388b83b9b74a424d657ae9f47047ae7a5370423b53b7f29f2591b67212f00dd60e6df540df9
-
SSDEEP
6144:345nY5PxafrsgDg66EJFCjm7KFJzXTeTwD:o5Y5JaTtrFizXIwD
Malware Config
Signatures
Files
-
b4e3f0a619b81522576160f3b59fa3a8a85d93370141db1eee3d6bcb43ffd431.exe windows x86
dbbecf22b03765ae424225a89fc12afc
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20/01/2010, 00:00Not After24/01/2012, 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
36:d1:6a:c5:08:31:1b:fe:6c:98:8b:5a:25:78:b0:e3:46:a8:4c:b0Signer
Actual PE Digest36:d1:6a:c5:08:31:1b:fe:6c:98:8b:5a:25:78:b0:e3:46:a8:4c:b0Digest Algorithmsha1PE Digest MatchesfalseSignature Validations
TrustedfalseVerification
Signing CertificateCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=US07/05/2010, 16:02 Valid: false
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
GetDiskFreeSpaceA
CreateMailslotW
GetTimeFormatW
lstrcmpiW
lstrcatW
lstrcpyW
FreeLibrary
MoveFileA
SetLocaleInfoW
IsValidCodePage
OpenMutexA
SetCalendarInfoW
GetLogicalDriveStringsW
EnumTimeFormatsA
GetModuleHandleA
GetVolumeInformationW
WinExec
OpenWaitableTimerW
GetTickCount
CreateEventA
GetLongPathNameA
CompareFileTime
lstrcmpiA
FileTimeToLocalFileTime
CopyFileExA
lstrcmpW
GetProcAddress
GetEnvironmentVariableW
GetOEMCP
GetVersionExW
GetTimeFormatA
InitializeCriticalSection
GetComputerNameA
user32
ActivateKeyboardLayout
MessageBeep
RegisterClassA
GetActiveWindow
WaitMessage
CreateDialogParamA
SetCapture
LoadIconA
RegisterClassExA
UpdateLayeredWindow
LoadIconW
PostMessageW
CreateDesktopW
SetWindowTextA
GetMenuItemInfoW
LoadBitmapW
DialogBoxParamW
LoadBitmapA
GetMessageW
gdi32
RemoveFontResourceA
AddFontResourceA
AddFontResourceW
GetTextExtentPointW
CreateFontW
GetEnhMetaFilePixelFormat
GetStockObject
GetTextExtentPointA
GetEnhMetaFileA
CreateBitmapIndirect
CreateICA
CreateFontIndirectA
RemoveFontResourceW
CreatePalette
SetWinMetaFileBits
CreateMetaFileA
TranslateCharsetInfo
advapi32
RegEnumKeyA
RegEnumValueW
RegCreateKeyExW
RegEnumKeyExW
RegEnumKeyExA
shell32
ShellExecuteA
StrRChrIA
DuplicateIcon
StrCmpNW
oleaut32
SafeArrayDestroyData
SafeArrayAllocData
VarCyFromI2
VarBoolFromUI8
DosDateTimeToVariantTime
VarBoolFromStr
oledlg
OleUIUpdateLinksW
wsock32
GetAddressByNameW
TransmitFile
GetServiceW
WSAAsyncGetServByName
EnumProtocolsA
WEP
gethostbyname
sethostname
GetAddressByNameA
Sections
.qgHYpb Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pvR Size: 512B - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aCaFug Size: 1024B - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Wy Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.OHhcq Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.aE Size: 3KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Kc Size: 3KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xJzyMd Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.alpBHl Size: 10KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.EoZgES Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ