Static task
static1
Behavioral task
behavioral1
Sample
fc009caa63a3078fcb6bab7ed6b372a075574c3621242310850f59e80cb1d03e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fc009caa63a3078fcb6bab7ed6b372a075574c3621242310850f59e80cb1d03e.exe
Resource
win10v2004-20230220-en
General
-
Target
fc009caa63a3078fcb6bab7ed6b372a075574c3621242310850f59e80cb1d03e.zip
-
Size
5.1MB
-
MD5
1c9c1897e96e1915d1ae020f91163edd
-
SHA1
78e20cff198575f0ebef015249f7ca23c69ec32b
-
SHA256
4019bafc2819b7e46d1c28a3824a400641275bb79d63b581c41c5a16928a6aa0
-
SHA512
ab8721b2ddd1935b1747e9a79ff1cbdc68b33254e5a46a2fc773d47480032c133c015655201be1360718b89fca77142882ae51a69b11b73094512de4b4d564de
-
SSDEEP
98304:qib7U4lJIv6gx6zI/yaUjAqJnNkyzvYiXeMaFGcGp6ahBNN8AnJeKhpNSHxzUnZ:qeUkY6gAzIa9UqR3zVOMan86GlnJeJHc
Malware Config
Signatures
Files
-
fc009caa63a3078fcb6bab7ed6b372a075574c3621242310850f59e80cb1d03e.zip.zip
Password: infected
-
fc009caa63a3078fcb6bab7ed6b372a075574c3621242310850f59e80cb1d03e.exe.exe windows x86
Password: infected
5665eebed57fc06895a9cc90635f07c8
Code Sign
4b:ec:ba:79:34:44:83:86:4d:b3:66:95:18:1a:6f:2aCertificate
IssuerCN=Samsung NET Q32R404FHWI RC65R539FHIZCINot Before27/02/2023, 19:26Not After28/02/2033, 19:26SubjectCN=Samsung NET Q32R404FHWI RC65R539FHIZCI90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11/05/2022, 00:00Not After10/08/2033, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
dc:fa:2f:7d:72:ee:03:52:dc:cd:aa:43:85:1f:13:a9:55:91:c9:c7:7d:16:6a:c2:dc:55:aa:77:79:5e:89:a6Signer
Actual PE Digestdc:fa:2f:7d:72:ee:03:52:dc:cd:aa:43:85:1f:13:a9:55:91:c9:c7:7d:16:6a:c2:dc:55:aa:77:79:5e:89:a6Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Samsung NET Q32R404FHWI RC65R539FHIZCI21/03/2023, 12:23 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
GetTempPathA
GetModuleHandleExA
GetTimeZoneInformation
CopyFileA
GetLastError
GetFileAttributesA
TzSpecificLocalTimeToSystemTime
CreateFileA
LoadLibraryA
GetVersionExA
LockResource
DeleteFileA
Process32Next
CloseHandle
GetSystemInfo
CreateThread
GetWindowsDirectoryA
LoadResource
SetFileAttributesA
GetLocalTime
GetProcAddress
LocalFree
RemoveDirectoryA
GetCurrentProcessId
GlobalMemoryStatusEx
FreeLibrary
WideCharToMultiByte
CreateDirectoryA
GetSystemTime
GetPrivateProfileStringA
IsWow64Process
GetComputerNameA
lstrcatA
lstrcpyA
HeapFree
HeapAlloc
lstrcpynA
GetProcessHeap
ReadFile
SetFilePointer
CreateFileW
GetLocaleInfoA
TryEnterCriticalSection
FindClose
EnterCriticalSection
GetFullPathNameW
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
GetFileAttributesW
UnmapViewOfFile
HeapValidate
HeapSize
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
WaitForSingleObjectEx
DeleteFileW
HeapReAlloc
LoadLibraryW
HeapCompact
HeapDestroy
UnlockFile
LockFileEx
GetFileSize
DeleteCriticalSection
SystemTimeToFileTime
GetSystemTimeAsFileTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetModuleFileNameA
SetStdHandle
GetModuleHandleA
GetCurrentThreadId
LocalAlloc
WaitForSingleObject
AreFileApisANSI
GetVolumeInformationA
lstrlenA
FindResourceA
FindNextFileA
GetUserDefaultLocaleName
TerminateProcess
WriteFile
GetCurrentProcess
FindFirstFileA
Process32First
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetPrivateProfileSectionNamesA
SizeofResource
HeapCreate
GetLocaleInfoW
LCMapStringW
CompareStringW
GetFileSizeEx
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
GetStdHandle
GetModuleFileNameW
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
FindFirstFileExW
FindNextFileW
GetFinalPathNameByHandleW
SetFilePointerEx
GetFileInformationByHandleEx
LCMapStringEx
InitializeCriticalSectionEx
EncodePointer
DecodePointer
CompareStringEx
GetCPInfo
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetFileType
ExitProcess
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetDesktopWindow
wsprintfA
GetSystemMetrics
GetDC
GetWindowRect
EnumDisplayDevicesA
CharNextA
ReleaseDC
GetKeyboardLayoutList
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteObject
BitBlt
advapi32
SystemFunction036
RegOpenKeyExA
GetUserNameA
CredFree
RegCloseKey
GetCurrentHwProfileA
RegQueryValueExA
CredEnumerateA
RegEnumKeyExA
shell32
SHGetFolderPathA
ShellExecuteA
crypt32
CryptUnprotectData
CryptStringToBinaryA
gdiplus
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipSaveImageToFile
setupapi
SetupDiGetDeviceInterfaceDetailA
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiEnumDeviceInfo
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp:;(� Size: - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp:;(� Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp:;(� Size: 5.3MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ