Static task
static1
Behavioral task
behavioral1
Sample
73861d0ac046dfdaf51e29552eee46e0e25efc03e1b8f856d252d21da6a00065.exe
Resource
win10-20220812-en
General
-
Target
73861d0ac046dfdaf51e29552eee46e0e25efc03e1b8f856d252d21da6a00065
-
Size
4.1MB
-
MD5
0ae581f2f3816bf4c3d20e7df2168063
-
SHA1
240dec76d9030b26f6726f55dd0f3a7742856b0c
-
SHA256
73861d0ac046dfdaf51e29552eee46e0e25efc03e1b8f856d252d21da6a00065
-
SHA512
ae19de646d0d7222122bc81eee906ff638908f966495e4636350760af6df94a8a15f4ef0436734b071b4f46fc15db0249c135378f555c457723ba513fb082840
-
SSDEEP
98304:zsnt0cW1roMdpiMR5qZNa/e4pUJ0n4A9ahoWP:z/cCrXpJ5qKm4pUan4ApWP
Malware Config
Signatures
Files
-
73861d0ac046dfdaf51e29552eee46e0e25efc03e1b8f856d252d21da6a00065.exe windows x86
99ff8bff99c874b1a1169c1f42931c72
Code Sign
a1:db:85:45:fe:43:d5:1b:2e:94:fa:b0:3f:7f:06:29Certificate
IssuerPOSTALCODE=10305Not Before16-02-2023 20:35Not After16-02-2024 20:35SubjectPOSTALCODE=1030552:88:4e:ae:a1:8d:1c:89:de:74:85:1a:64:5d:ea:87:01:11:f0:6a:a2:22:af:c7:30:4b:aa:6d:95:76:db:83Signer
Actual PE Digest52:88:4e:ae:a1:8d:1c:89:de:74:85:1a:64:5d:ea:87:01:11:f0:6a:a2:22:af:c7:30:4b:aa:6d:95:76:db:83Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030507-02-2023 20:39 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleInputA
MoveFileWithProgressA
GetModuleHandleW
GetCurrentThread
GetConsoleAliasesA
GetNumberFormatA
GetGeoInfoW
LoadLibraryW
GetConsoleAliasExesLengthW
GetVersionExW
GetFileAttributesA
GetMailslotInfo
CreateActCtxA
GetBinaryTypeW
GetACP
InterlockedExchange
GetLastError
GetProcAddress
VirtualAlloc
RemoveDirectoryA
GetNumaHighestNodeNumber
PrepareTape
WriteConsoleA
UnhandledExceptionFilter
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
IsSystemResumeAutomatic
GetDiskFreeSpaceA
OpenJobObjectW
SetConsoleCursorInfo
GetModuleHandleA
HeapSetInformation
EraseTape
GetStringTypeW
GetConsoleTitleW
FatalAppExitA
SetFileShortNameA
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
LoadLibraryA
HeapReAlloc
DeleteVolumeMountPointA
MapUserPhysicalPages
GetNativeSystemInfo
GetProcessWorkingSetSize
GetLocaleInfoA
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapAlloc
HeapFree
Sleep
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
LeaveCriticalSection
EnterCriticalSection
user32
GetClipCursor
GetCursorInfo
SetCaretPos
GetKeyNameTextW
RealGetWindowClassW
IsChild
LoadMenuA
CharLowerBuffW
CharUpperA
CharUpperBuffA
advapi32
ReportEventW
SetKernelObjectSecurity
MapGenericMask
LogonUserA
ole32
CoUninitialize
ReadClassStg
winhttp
WinHttpCheckPlatform
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ