Static task
static1
Behavioral task
behavioral1
Sample
4640e5b9817fd35d92b0d0687003576c75fd4e0df34bcfa0008c6ca3450a8f6d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4640e5b9817fd35d92b0d0687003576c75fd4e0df34bcfa0008c6ca3450a8f6d.exe
Resource
win10v2004-20220812-en
General
-
Target
083b5ff18230518a7726e0701b6cb24e.bin
-
Size
1.4MB
-
MD5
6f7f5485f7efcb49f26cb2f2c5e6708a
-
SHA1
69d6030fe072780362f29d9e9a3ce957760fda65
-
SHA256
a3f51710d2f3c308f59e9dad84254b703cf9fd30c360834ab8478247e517f176
-
SHA512
110fafba69618b7870203cc31413fb716c9c030b0cfdb047514a3c1c5900e42a5e19296078ad32ac257f03e5b9b6ef6a09ce6be88e957e1ec6ecacc29fac5984
-
SSDEEP
24576:JyUDdhx5Xuw5xDm8g/kU4FWWnILit3t2t3gV4p6ZyFoh9V1TykBOHHKWMSMDUCTQ:ogVP5x68HU4gHPhK4c9VllBlNSATNDmD
Malware Config
Signatures
Files
-
083b5ff18230518a7726e0701b6cb24e.bin.zip
Password: infected
-
4640e5b9817fd35d92b0d0687003576c75fd4e0df34bcfa0008c6ca3450a8f6d.exe.exe windows x86
Password: infected
39a4439f8bc5e6e61317c81ff97d3d8f
Code Sign
38:ab:43:22:5e:f5:3c:a6Certificate
IssuerCN=Go Daddy Secure Certificate Authority - G2,OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=Arizona,C=USNot Before19-03-2022 18:00Not After20-04-2023 18:00SubjectCN=*.oreilly.com7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12-01-2016 00:00Not After11-01-2031 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23-12-2017 00:00Not After22-03-2029 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
52:38:29:0a:55:6e:cb:5a:0b:2a:a4:94:b5:6f:62:1f:79:d8:37:20:0c:b0:02:35:3e:4f:39:bd:93:62:df:93Signer
Actual PE Digest52:38:29:0a:55:6e:cb:5a:0b:2a:a4:94:b5:6f:62:1f:79:d8:37:20:0c:b0:02:35:3e:4f:39:bd:93:62:df:93Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=*.oreilly.com26-01-2023 16:51 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
GetCommandLineW
lstrlenA
GetCurrentProcess
GetEnvironmentStringsW
GetTickCount
GetProcessHeap
GetUserDefaultLangID
lstrlenW
GetStartupInfoW
GetLastError
SetLastError
GetProcAddress
IsValidCodePage
LoadLibraryA
GetOEMCP
GetModuleHandleA
CreateFileW
SetEndOfFile
GetStringTypeW
LCMapStringW
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
FlushFileBuffers
SetStdHandle
IsProcessorFeaturePresent
LoadLibraryW
OutputDebugStringW
WriteConsoleW
HeapSetInformation
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DecodePointer
EncodePointer
GetModuleFileNameW
RtlUnwind
MultiByteToWideChar
ReadFile
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
CloseHandle
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
GetModuleHandleW
ExitProcess
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
WriteFile
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
GetACP
GetCPInfo
CreateFileA
OutputDebugStringA
RaiseException
user32
PostQuitMessage
IsIconic
GetMessageExtraInfo
GetTopWindow
IsZoomed
GetLastActivePopup
GetParent
GetWindowTextLengthA
AnyPopup
GetDoubleClickTime
GetForegroundWindow
CreatePopupMenu
GetClassInfoA
IsWow64Message
GetDlgCtrlID
EnumDisplayDevicesA
GetDialogBaseUnits
GetMessageTime
GetMessagePos
GetShellWindow
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ