Static task
static1
Behavioral task
behavioral1
Sample
f844dee043da51613eb781aa18f3422413e743c94701ccfbc24a6c4586e1f620.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f844dee043da51613eb781aa18f3422413e743c94701ccfbc24a6c4586e1f620.exe
Resource
win10v2004-20220812-en
General
-
Target
f844dee043da51613eb781aa18f3422413e743c94701ccfbc24a6c4586e1f620
-
Size
175KB
-
MD5
0315b734fd995cdc5043e006d75a3000
-
SHA1
e68d5213c70d35c89db41f510373013517ea3c92
-
SHA256
f844dee043da51613eb781aa18f3422413e743c94701ccfbc24a6c4586e1f620
-
SHA512
ca406aa6872db4b289d1294293c952a435258eb3c4f0a3ee371bc69c84cb074b0686c14a736fff6ddfaac112889f3fc3a68e0b5236774d94fbb1bd25b5f07eb9
-
SSDEEP
3072:kBAw87mZ4wilO/A8IdEJZublonARKukr8kTF9TaqDIgZPDHhiHvDL/dwzF:Vw87mZ4wMCIdEbwl2dukIONaYsiF
Malware Config
Signatures
Files
-
f844dee043da51613eb781aa18f3422413e743c94701ccfbc24a6c4586e1f620.exe windows x86
c19c8cfa2adcd330aecd5697069a6073
Code Sign
03:c7:8f:37:db:92:28:df:3c:bb:1a:ad:82:fa:67:10Certificate
IssuerOU=VeriSign Commercial Software Publishers CA,O=VeriSign\, Inc.,L=InternetNot Before09-04-1996 00:00Not After07-01-2004 23:59SubjectOU=VeriSign Commercial Software Publishers CA,O=VeriSign\, Inc.,L=Internetfc:a4:a5:9f:2c:0f:c0:b9:03:98:33:1b:7b:54:54:1dCertificate
IssuerOU=VeriSign\, Inc.+OU=VeriSign Time Stamping Service Root+OU=NO LIABILITY ACCEPTED\, (c)97 VeriSign\, Inc.,O=VeriSign Trust NetworkNot Before16-11-1999 00:00Not After06-01-2004 23:59SubjectCN=VeriSign Time Stamping Service CA SW1,OU=VeriSign Trust Network+OU=www.verisign.com/repository/RPA Incorp. by Ref.\,LIAB.LTD(c)98,O=VeriSign\, Inc.Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
75:f2:8e:f8:a8:fb:ea:6d:11:52:97:14:95:4b:65:5cCertificate
IssuerOU=VeriSign Commercial Software Publishers CA,O=VeriSign\, Inc.,L=InternetNot Before04-04-2000 00:00Not After17-04-2001 23:59SubjectCN=Microsoft Corporation,OU=VeriSign Commercial Software Publishers CA+OU=www.verisign.com/repository/RPA Incorp. by Ref.\,LIAB.LTD(c)98+OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Microsoft Corporation,O=VeriSign\, Inc.,L=Internet+L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExA
DeregisterEventSource
ReportEventA
RegisterEventSourceW
RegEnumValueA
GetUserNameA
comctl32
ord17
gdi32
CreateFontA
DeleteDC
RestoreDC
DeleteObject
GetTextFaceA
SelectObject
GetTextMetricsA
GetDeviceCaps
SetMapMode
SaveDC
Polyline
CreatePen
ExtTextOutW
GetTextExtentPoint32W
SetTextAlign
SetBkMode
SetTextColor
CreateFontIndirectA
GetObjectA
kernel32
GetModuleHandleA
MultiByteToWideChar
GetCommandLineA
GetCommandLineW
MapViewOfFile
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjects
LeaveCriticalSection
EnterCriticalSection
ExitProcess
GetStartupInfoA
CloseHandle
CreateThread
Sleep
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
LoadLibraryA
SetUnhandledExceptionFilter
MulDiv
WideCharToMultiByte
IsBadReadPtr
GetModuleFileNameA
GetSystemDefaultLangID
GetProcAddress
GetUserDefaultLangID
GetACP
GetSystemDefaultLCID
GetVersionExA
FreeLibrary
InitializeCriticalSection
GetProcessHeap
DeleteCriticalSection
lstrcpyA
GetLastError
GetProfileStringA
SetEvent
CreateSemaphoreA
CreateProcessW
ExpandEnvironmentStringsW
CreateFileMappingA
GetFileSize
CreateFileA
DeleteFileA
DeleteFileW
GetTickCount
SetEnvironmentVariableA
ReadProcessMemory
VirtualQueryEx
GetSystemInfo
GetFileAttributesA
CreateDirectoryA
WriteFile
SetFilePointer
CreateFileW
GetTempPathA
GetTempPathW
GetFileAttributesW
CreateDirectoryW
LockResource
LoadResource
FindResourceExA
GetSystemDirectoryA
SetEndOfFile
ExpandEnvironmentStringsA
IsDBCSLeadByte
CreateProcessA
SuspendThread
GetSystemTime
GetComputerNameA
CreateMutexA
TlsAlloc
TlsFree
TlsSetValue
VirtualFree
TlsGetValue
UnmapViewOfFile
SetLastError
HeapAlloc
GetLocaleInfoA
IsValidCodePage
VirtualAlloc
TerminateThread
GetCurrentThreadId
GetThreadContext
GetThreadSelectorEntry
ResumeThread
HeapFree
GetStringTypeA
GetStringTypeW
RtlUnwind
LCMapStringA
LCMapStringW
oleaut32
SysFreeString
SystemTimeToVariantTime
VariantTimeToDosDateTime
SysStringLen
SysAllocString
shell32
ShellExecuteExA
ExtractIconExA
user32
SetWindowLongA
DestroyWindow
MessageBoxA
DrawIconEx
EnableWindow
CheckDlgButton
GetSysColor
IsDlgButtonChecked
LoadIconA
DrawFocusRect
SetWindowTextW
GetWindow
LoadCursorA
DestroyIcon
GetWindowPlacement
IsIconic
wsprintfW
LoadStringW
GetWindowThreadProcessId
EnumWindows
CallWindowProcA
CallWindowProcW
IsWindowUnicode
SystemParametersInfoA
GetClientRect
SendDlgItemMessageA
SetFocus
EndDialog
GetDlgItem
ShowWindow
SetCursor
InvalidateRect
DialogBoxParamW
DialogBoxParamA
CreateDialogParamW
CreateDialogParamA
SetWindowTextA
GetDC
MapWindowPoints
GetSysColorBrush
FillRect
ReleaseDC
GetSystemMetrics
SetForegroundWindow
GetWindowLongA
GetWindowRect
SetWindowPos
RegisterClassExA
CreateWindowExA
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
DefWindowProcA
KillTimer
wsprintfA
SendMessageA
PostMessageA
SetScrollInfo
GetScrollInfo
SetDlgItemTextA
SetTimer
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
GetFileVersionInfoA
GetFileVersionInfoW
wininet
InternetSetOptionA
InternetWriteFile
HttpSendRequestExA
InternetCanonicalizeUrlA
InternetReadFileExA
HttpEndRequestA
InternetOpenA
InternetSetStatusCallback
InternetAutodial
InternetGetConnectedState
InternetQueryOptionA
HttpQueryInfoA
InternetCloseHandle
HttpOpenRequestA
InternetConnectA
Sections
.text Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE