Static task
static1
Behavioral task
behavioral1
Sample
df9861718fa3139683e0f3d9147390399929bd4d88502bcdadb9f7f9ff03f773.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df9861718fa3139683e0f3d9147390399929bd4d88502bcdadb9f7f9ff03f773.exe
Resource
win10v2004-20221111-en
General
-
Target
df9861718fa3139683e0f3d9147390399929bd4d88502bcdadb9f7f9ff03f773
-
Size
15KB
-
MD5
06b63a78914d67548dc53da912ebb12a
-
SHA1
ed5ffbaa996848c5b0d2ba2e07ab705cc6d4da9f
-
SHA256
df9861718fa3139683e0f3d9147390399929bd4d88502bcdadb9f7f9ff03f773
-
SHA512
dc5d2466326e7c4609d584bbbf9382ebdb36b18feb1b8e882d3dd87fa7559a3e4a9a062f1cd84508d7a432b3747a73a6b99cef1971df5690ffa49a644d3f337c
-
SSDEEP
384:PLQHdJuXeWiJh8tJrkzVM/i8WPmWWZ/fbCD21Lo:TJXeWimd+yi4tbCqL
Malware Config
Signatures
Files
-
df9861718fa3139683e0f3d9147390399929bd4d88502bcdadb9f7f9ff03f773.exe windows x86
e9f50fb0ef76f6e87065ee6d7886cd7f
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US67:24:34:0d:db:c7:25:2f:7f:b7:14:b8:12:a5:c0:4dCertificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before27/11/2009, 00:00Not After27/11/2011, 23:59SubjectCN=YNK JAPAN Inc,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=YNK JAPAN Inc,L=\ Nihonbashi Kodenmachou10-6,ST=Chuo-ku,C=JPExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
18:c4:1b:5d:91:21:67:96:ae:0f:60:ac:6e:69:46:79:ed:a6:37:ffSigner
Actual PE Digest18:c4:1b:5d:91:21:67:96:ae:0f:60:ac:6e:69:46:79:ed:a6:37:ffDigest Algorithmsha1PE Digest MatchesfalseSignature Validations
TrustedfalseVerification
Signing CertificateCN=YNK JAPAN Inc,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=YNK JAPAN Inc,L=\ Nihonbashi Kodenmachou10-6,ST=Chuo-ku,C=JP01/12/2022, 14:34 Valid: false
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitNamedPipeA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetSystemDirectoryA
DeleteFileA
VirtualFree
ReadFile
VirtualAlloc
GetFileSize
Sleep
GetTempFileNameA
GetTempPathA
SetFilePointer
CreateProcessA
WinExec
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
GetModuleHandleA
VirtualFreeEx
GetProcAddress
WriteProcessMemory
VirtualAllocEx
CreateMutexA
DisconnectNamedPipe
PeekNamedPipe
ConnectNamedPipe
CreateNamedPipeA
TerminateThread
OpenMutexA
GetShortPathNameA
CopyFileA
GetWindowsDirectoryA
GetModuleFileNameA
CreateThread
SetFileAttributesA
GetFileAttributesA
GetDriveTypeA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
ExitProcess
WaitForSingleObject
CreateEventA
SetEvent
OpenEventA
GetLastError
CreateFileA
WriteFile
OpenProcess
CloseHandle
user32
GetWindowThreadProcessId
PostMessageA
EnumWindows
wsprintfA
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
msvcrt
_stricmp
Sections
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE