Static task
static1
Behavioral task
behavioral1
Sample
e4860f2f0c77c98c1cdc22bcacf98c0568f4cc99c77a2217b08dd9249a198e20.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e4860f2f0c77c98c1cdc22bcacf98c0568f4cc99c77a2217b08dd9249a198e20.exe
Resource
win10v2004-20230220-en
General
-
Target
e4860f2f0c77c98c1cdc22bcacf98c0568f4cc99c77a2217b08dd9249a198e20.zip
-
Size
792KB
-
MD5
3fb431be277795fb5dbbf906b79c83cf
-
SHA1
aac5072dfff7d70e8a0f1ebb52e5701eb3bd0a1e
-
SHA256
81af36052402b9404c53d2dd48d14839bdf58613d6a859b8cea5f0cb3990d5b0
-
SHA512
897d49e17d3b196c2beba371b42e668cd13a9dff559f2a7b227b450e51e946a08f31d905bc5847359a84010d98d8cef191dd13ecd0682ef26db00fe193b0b9c8
-
SSDEEP
24576:5/JIDJQ9AhXsWbzQv66EGBvAMQaGoHD4gV1:5/JItfh8WG66EGBvA9AD4gf
Malware Config
Signatures
Files
-
e4860f2f0c77c98c1cdc22bcacf98c0568f4cc99c77a2217b08dd9249a198e20.zip.zip
Password: infected
-
e4860f2f0c77c98c1cdc22bcacf98c0568f4cc99c77a2217b08dd9249a198e20.exe.exe windows x64
Password: infected
ec6d5d830396fbc1a5511410fef654a0
Code Sign
4f:db:ea:21:70:f2:c1:81:44:a4:10:93:99:42:5e:77Certificate
IssuerCN=HDD Verbatim Digital EVO-II 5Tb HDWG460EZSTA N300 (10200rpm) 6072Mb 1.5 RtlNot Before19/01/2023, 16:03Not After20/01/2033, 16:03SubjectCN=HDD Verbatim Digital EVO-II 5Tb HDWG460EZSTA N300 (10200rpm) 6072Mb 1.5 Rtl90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11/05/2022, 00:00Not After10/08/2033, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
4c:be:b8:1b:13:cb:78:93:c8:43:21:17:ab:af:cb:49:fd:97:bb:c4:d2:41:23:c3:28:8b:fe:f0:84:78:68:baSigner
Actual PE Digest4c:be:b8:1b:13:cb:78:93:c8:43:21:17:ab:af:cb:49:fd:97:bb:c4:d2:41:23:c3:28:8b:fe:f0:84:78:68:baDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=HDD Verbatim Digital EVO-II 5Tb HDWG460EZSTA N300 (10200rpm) 6072Mb 1.5 Rtl27/02/2023, 09:36 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shell32
SHGetDiskFreeSpaceExW
mscoree
_CorExeMain
advapi32
GetUserNameW
user32
GetCursor
kernel32
GetModuleHandleA
Sections
.reloc Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 53KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE