Static task
static1
Behavioral task
behavioral1
Sample
df679e1490f713b1f06249335f472b9aaf3d2f743df04709993de51d484e782a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df679e1490f713b1f06249335f472b9aaf3d2f743df04709993de51d484e782a.exe
Resource
win10v2004-20220901-en
General
-
Target
df679e1490f713b1f06249335f472b9aaf3d2f743df04709993de51d484e782a
-
Size
401KB
-
MD5
9f2997e768e76fafd9c22ef4b7d8cbe1
-
SHA1
c577bf29835f953252ba2bf46df540bf5a9112c4
-
SHA256
df679e1490f713b1f06249335f472b9aaf3d2f743df04709993de51d484e782a
-
SHA512
dc8ff4eda7597987a6315d273ffc3b67cbb253732c730fec214d7dcdcaa5435bcbd5aa1b2b4fc41351b55a96ad55aaa074f18e7258eed03f734ed892467d009d
-
SSDEEP
6144:LP0736HQ71UJ2qRxAxWeNSde8me/1YYi25c/7yVfaSID2TGS5EangG7YaJjwPAMT:LMUyCJtxOQtdMscz0IX7YJl/vIH
Malware Config
Signatures
Files
-
df679e1490f713b1f06249335f472b9aaf3d2f743df04709993de51d484e782a.exe windows x86
18ed2a840f64c83593dd4d9487d2d677
Code Sign
49:40:77:0b:ae:23:96:75:b0:49:8e:02:3c:ed:41:9cCertificate
IssuerCN=Root AgencyNot Before02/11/2011, 06:39Not After31/12/2039, 23:59SubjectCN=XYZ Def23:67:a1:5d:30:67:e9:be:e0:47:15:4a:71:0d:f8:9c:9c:95:3e:fdSigner
Actual PE Digest23:67:a1:5d:30:67:e9:be:e0:47:15:4a:71:0d:f8:9c:9c:95:3e:fdDigest Algorithmsha1PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=XYZ Def01/12/2022, 14:34 Valid: false
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
opengl32
glShadeModel
glGetPixelMapuiv
glTranslated
glEvalMesh1
glLightModeliv
glReadBuffer
glPixelMapusv
glArrayElement
glu32
gluNurbsCurve
gluQuadricCallback
gluEndCurve
gluUnProject
gluTessNormal
gluPerspective
oledlg
ord8
advapi32
RegQueryInfoKeyA
RegOpenKeyExA
RegLoadKeyA
RegSaveKeyA
RegUnLoadKeyA
RegCloseKey
RegEnumValueA
msvcrt
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
kernel32
GetCurrentProcessId
DeleteFileA
WriteProfileStringA
CopyFileA
GetCurrentThreadId
GetModuleHandleA
ExitProcess
VirtualAlloc
GetProcAddress
GetStartupInfoA
GetPrivateProfileSectionA
GetProfileStringA
CreateMutexA
DeleteCriticalSection
CreateSemaphoreA
GetCPInfoExA
LocalSize
IsBadCodePtr
IsBadReadPtr
HeapAlloc
VirtualLock
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 379KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ