Static task
static1
Behavioral task
behavioral1
Sample
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.exe
Resource
win10v2004-20230220-en
General
-
Target
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.zip
-
Size
2.0MB
-
MD5
e714f19d01499501b825d8df20361709
-
SHA1
ae076c6586a8431c769c3027d3055dd147f7f451
-
SHA256
3d98911c0a3f0595148a6419e3b623405f1726041656f4139539b182b04a5e47
-
SHA512
ba69c8b11e9a162a31e8811cc7356e652e36a11c9705a9981918342b18467f1ab57431fef5a859eb37bb8a5603676b972ef956122931bc6f81bccc7c06051b60
-
SSDEEP
49152:XylSPkaNnxwW1RxVkQLU6OOZmzzdBQUFtvgSriuaXr2hTYV+i:EWNVHEUOOyFZ+Lsri
Malware Config
Signatures
Files
-
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.zip.zip
Password: infected
-
c010fd9ba72ee15ab8aad81831527d317d21a38c87e507a50cb0285a47bbb787.exe.exe windows x64
Password: infected
6a66c55dd5fb9d7ca938b83486511180
Code Sign
56:ca:81:ef:dc:5e:fa:b8:42:75:cc:05:9f:f3:aa:7eCertificate
IssuerCN=Samsung JP Q32R404FHWI RC65R539FHIZCINot Before01/03/2023, 11:55Not After02/03/2033, 11:55SubjectCN=Samsung JP Q32R404FHWI RC65R539FHIZCI90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11/05/2022, 00:00Not After10/08/2033, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
6e:c7:c2:bb:e2:2a:19:35:fb:0a:e7:af:fe:80:9a:9a:b5:e5:e7:2e:a2:dd:32:7e:7b:d2:f3:43:c9:0e:d6:1dSigner
Actual PE Digest6e:c7:c2:bb:e2:2a:19:35:fb:0a:e7:af:fe:80:9a:9a:b5:e5:e7:2e:a2:dd:32:7e:7b:d2:f3:43:c9:0e:d6:1dDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Samsung JP Q32R404FHWI RC65R539FHIZCI27/02/2023, 09:36 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shell32
SHGetDiskFreeSpaceExW
mscoree
_CorExeMain
advapi32
RegCloseKey
user32
CreateWindowExA
kernel32
GetModuleHandleA
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 698KB - Virtual size: 698KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE