Static task
static1
Behavioral task
behavioral1
Sample
e864f7721dd8e4b01d740391a1faa59cf3fde42b222d4aef524d29279a141166.exe
Resource
win10v2004-20230220-en
General
-
Target
e864f7721dd8e4b01d740391a1faa59cf3fde42b222d4aef524d29279a141166.7z
-
Size
1.0MB
-
MD5
f130f083bd0b49b9e838499fa720f261
-
SHA1
63d9cc0152875bb1060dca360e1a8da528930075
-
SHA256
3697ff8421a9a75d9d822702b69b95ad9aed227243bb86f8933f19f33ea64b9d
-
SHA512
8755687676233eec49247e431b4be8b675b18645864315c692395631d3faad39583656ab959220dc93e4ca2844d65cfa6418a2a95200d6612daaa57ca4195993
-
SSDEEP
24576:8V9HxzfGAoPG4X4g7KfNxE6ji8/q5k4IBk0RF:Ih0AoPGeLgc6+95k4SLF
Malware Config
Signatures
Files
-
e864f7721dd8e4b01d740391a1faa59cf3fde42b222d4aef524d29279a141166.7z.7z
Password: infected
-
e864f7721dd8e4b01d740391a1faa59cf3fde42b222d4aef524d29279a141166.exe windows x86
Password: infected
f37295a71096ccb7f8bd10df4a9c36a8
Code Sign
20:5f:8d:39:8d:93:06:bc:47:e8:71:10:5f:8f:5b:04Certificate
IssuerCN=SD-20200708AEDH\\AdministratorNot Before24/07/2020, 11:36Not After24/07/2021, 17:36SubjectCN=SD-20200708AEDH\\Administrator00:72:82:92:b0:d5:98:66:48:45:b8:cb:eb:89:51:2b:5d:6d:95:97:2f:94:14:a5:45:46:e4:23:7c:3e:5f:62Signer
Actual PE Digest00:72:82:92:b0:d5:98:66:48:45:b8:cb:eb:89:51:2b:5d:6d:95:97:2f:94:14:a5:45:46:e4:23:7c:3e:5f:62Digest Algorithmsha256PE Digest MatchesfalseSignature Validations
TrustedfalseVerification
Signing CertificateCN=SD-20200708AEDH\\Administrator09/03/2023, 18:52 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
CreateToolhelp32Snapshot
GetVersionExA
CloseHandle
GetTempPathA
SetErrorMode
CopyFileA
GetModuleFileNameA
GetProcAddress
GetLastError
ReadFile
Thread32Next
CreateProcessA
Sleep
Thread32First
OpenThread
OpenProcess
WriteFile
ExpandEnvironmentStringsA
GetProcessHeap
HeapFree
GetCurrentProcess
Process32First
GetSystemDirectoryA
Module32First
Process32Next
Module32Next
SetFilePointer
GetTickCount
GetFileAttributesA
CreateMutexA
WaitForSingleObject
TerminateThread
ExitThread
GetExitCodeThread
CreateThread
SetThreadContext
TerminateProcess
DuplicateHandle
GetFileTime
SetFileAttributesA
SetFileTime
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
SetHandleCount
GetFileType
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEndOfFile
lstrlenA
GetFileSize
CreateFileA
GetComputerNameA
user32
EnumChildWindows
GetForegroundWindow
SendMessageA
GetWindowRect
GetClassNameA
WaitForInputIdle
advapi32
CryptReleaseContext
CryptAcquireContextA
CryptCreateHash
CryptGetHashParam
CryptDestroyHash
CryptHashData
LookupPrivilegeValueA
GetUserNameA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
psapi
GetModuleFileNameExA
Sections
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 729KB - Virtual size: 736KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.EBSS Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ