Static task
static1
Behavioral task
behavioral1
Sample
dc31d4dbb94a192a6d59b06d1d2f3ebd00eacd13692eadf1052a272904df358d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dc31d4dbb94a192a6d59b06d1d2f3ebd00eacd13692eadf1052a272904df358d.exe
Resource
win10v2004-20230220-en
General
-
Target
dc31d4dbb94a192a6d59b06d1d2f3ebd00eacd13692eadf1052a272904df358d
-
Size
561KB
-
MD5
1e949c34d71534457f1c47116ec82056
-
SHA1
4cf1073b30e10cf325f15c382435818c0ef69ba5
-
SHA256
dc31d4dbb94a192a6d59b06d1d2f3ebd00eacd13692eadf1052a272904df358d
-
SHA512
691aa6378ab042b55c8939dd68ca7ccac38ae55f36d20a6c0edc060d3878560c1911928e39c930db30c4bfb6b52c63bfd30db678182c467baef50d4ac7302ba6
-
SSDEEP
12288:JdscX+7mYyaMJXPj0j9T6o8ohE/exCJGNm6bHffoK6WYk:Jc66MJXPwT6Zv8NvDp
Malware Config
Signatures
Files
-
dc31d4dbb94a192a6d59b06d1d2f3ebd00eacd13692eadf1052a272904df358d.exe windows x64
9893683d3fa7ceb6ce2e07ab9c970e84
Code Sign
12:00:2e:63:04:38:db:88:1e:4f:1d:8b:92:00:00:00:2e:63:04Certificate
IssuerCN=Microsoft RSA TLS CA 01,O=Microsoft Corporation,C=USNot Before08/07/2022, 18:22Not After08/07/2023, 18:22SubjectCN=www.microsoft.com,O=Microsoft Corporation,L=Redmond,ST=WA,C=US7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12/01/2016, 00:00Not After11/01/2031, 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23/12/2017, 00:00Not After22/03/2029, 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
49:6c:71:93:c3:51:e6:c0:05:ed:e6:bd:a6:c4:9e:dc:d5:19:6c:db:6f:09:a7:f9:76:dc:80:f3:03:0b:43:7bSigner
Actual PE Digest49:6c:71:93:c3:51:e6:c0:05:ed:e6:bd:a6:c4:9e:dc:d5:19:6c:db:6f:09:a7:f9:76:dc:80:f3:03:0b:43:7bDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=www.microsoft.com,O=Microsoft Corporation,L=Redmond,ST=WA,C=US02/08/2022, 10:42 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FindClose
GetModuleHandleA
MultiByteToWideChar
GetLastError
LoadLibraryW
ExitProcess
FreeLibrary
WideCharToMultiByte
Sleep
CreateThread
WriteFile
CreateFileW
SizeofResource
FindResourceA
FreeResource
LockResource
LoadResource
VirtualProtect
RtlVirtualUnwind
GetStdHandle
GetEnvironmentVariableW
GetFileType
GetModuleHandleW
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcess
ReadFile
OpenThread
GetCurrentProcessId
GetProcAddress
GetThreadContext
RaiseException
CloseHandle
Process32Next
GetFileAttributesA
CreateToolhelp32Snapshot
GetCurrentThreadId
Process32First
FindNextFileW
FindFirstFileExW
HeapReAlloc
RtlUnwind
ReadConsoleW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileSizeEx
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetCommandLineW
GetCommandLineA
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
user32
GetMessageA
DispatchMessageA
PeekMessageW
PostThreadMessageA
advapi32
CryptDestroyKey
CryptAcquireContextA
CryptDecrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
CryptDestroyHash
CryptReleaseContext
ws2_32
connect
socket
inet_addr
WSAStartup
closesocket
WSACleanup
getaddrinfo
inet_ntoa
htons
winhttp
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpConnect
WinHttpSendRequest
WinHttpCloseHandle
WinHttpSetOption
WinHttpReadData
WinHttpOpen
WinHttpOpenRequest
Sections
.text Size: 233KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ