Static task
static1
Behavioral task
behavioral1
Sample
69de611dde0323993c3180802e30304bb6f041f22b9a3cac76d84fc3ce056fea.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
69de611dde0323993c3180802e30304bb6f041f22b9a3cac76d84fc3ce056fea.exe
Resource
win10v2004-20230220-en
General
-
Target
69de611dde0323993c3180802e30304bb6f041f22b9a3cac76d84fc3ce056fea.zip
-
Size
5.2MB
-
MD5
9c329a152c0c1265e37f8e2d85f34c04
-
SHA1
b08c5d99fac92b08b0c3606d72d47e25bf0b5b51
-
SHA256
6be9d2d3036af5ff75757f2c446b03f531bed55e03ba4ec30a8666c47718dbd2
-
SHA512
4354204d8ccf21ebd2a695d4d695b88b6f5ff70fe2a6024f7cc947d91be731a3f3f67bafa5d6a7dcc96c430d4878ac6c02f61d6861ed682ee1f4784363bba1bc
-
SSDEEP
98304:ZdSeKFYsLYRJF8UtYEM2RlS5aXwlNBZnQ7emq6mxUc0r0pG2XnXMZM8v6Q:CQvJ3SEFGY4nZ16KH0rInyMS
Malware Config
Signatures
Files
-
69de611dde0323993c3180802e30304bb6f041f22b9a3cac76d84fc3ce056fea.zip.zip
Password: infected
-
69de611dde0323993c3180802e30304bb6f041f22b9a3cac76d84fc3ce056fea.exe.exe windows x86
Password: infected
8f0d953cd970844dc8e8cd9c9fc09f0c
Code Sign
4b:ec:ba:79:34:44:83:86:4d:b3:66:95:18:1a:6f:2aCertificate
IssuerCN=Samsung NET Q32R404FHWI RC65R539FHIZCINot Before27/02/2023, 19:26Not After28/02/2033, 19:26SubjectCN=Samsung NET Q32R404FHWI RC65R539FHIZCI90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11/05/2022, 00:00Not After10/08/2033, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:92:07:95:46:c7:f4:b9:04:47:76:b9:b5:63:b5:4a:8c:4d:4a:d9:e3:b8:67:55:fa:54:59:2a:54:6f:35:78Signer
Actual PE Digest61:92:07:95:46:c7:f4:b9:04:47:76:b9:b5:63:b5:4a:8c:4d:4a:d9:e3:b8:67:55:fa:54:59:2a:54:6f:35:78Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Samsung NET Q32R404FHWI RC65R539FHIZCI21/03/2023, 12:22 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
GetTempPathA
GetModuleHandleExA
GetTimeZoneInformation
CopyFileA
GetLastError
GetFileAttributesA
TzSpecificLocalTimeToSystemTime
CreateFileA
LoadLibraryA
GetVersionExA
LockResource
DeleteFileA
Process32Next
CloseHandle
GetSystemInfo
CreateThread
GetWindowsDirectoryA
LoadResource
SetFileAttributesA
GetLocalTime
GetProcAddress
LocalFree
RemoveDirectoryA
GetCurrentProcessId
GlobalMemoryStatusEx
FreeLibrary
WideCharToMultiByte
CreateDirectoryA
GetSystemTime
GetPrivateProfileStringA
IsWow64Process
GetComputerNameA
lstrcatA
lstrcpyA
lstrcpynA
ReadFile
SetFilePointer
CreateFileW
AreFileApisANSI
TryEnterCriticalSection
HeapCreate
GetLocaleInfoA
FindClose
GetFullPathNameW
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
GetFileAttributesW
UnmapViewOfFile
HeapValidate
HeapSize
FormatMessageW
GetDiskFreeSpaceA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
WaitForSingleObjectEx
DeleteFileW
HeapReAlloc
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
LockFileEx
GetFileSize
DeleteCriticalSection
GetProcessHeap
SystemTimeToFileTime
GetSystemTimeAsFileTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
LocalAlloc
WaitForSingleObject
HeapFree
GetVolumeInformationA
lstrlenA
FindResourceA
FindNextFileA
GetUserDefaultLocaleName
TerminateProcess
WriteFile
GetCurrentProcess
FindFirstFileA
Process32First
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
GetPrivateProfileSectionNamesA
SizeofResource
EnterCriticalSection
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetFileSizeEx
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
GetStdHandle
GetModuleFileNameW
FreeLibraryAndExitThread
ExitThread
FindFirstFileExW
FindNextFileW
GetFinalPathNameByHandleW
SetFilePointerEx
GetFileInformationByHandleEx
LCMapStringEx
InitializeCriticalSectionEx
EncodePointer
DecodePointer
CompareStringEx
GetCPInfo
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetFileType
ExitProcess
GetModuleHandleExW
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetDesktopWindow
wsprintfA
GetSystemMetrics
GetDC
GetWindowRect
EnumDisplayDevicesA
ReleaseDC
GetKeyboardLayoutList
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteObject
BitBlt
advapi32
SystemFunction036
RegOpenKeyExA
GetUserNameA
CredFree
RegCloseKey
GetCurrentHwProfileA
RegQueryValueExA
CredEnumerateA
RegEnumKeyExA
shell32
SHGetFolderPathA
ShellExecuteA
crypt32
CryptUnprotectData
CryptStringToBinaryA
gdiplus
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipSaveImageToFile
setupapi
SetupDiGetDeviceInterfaceDetailA
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiEnumDeviceInfo
Sections
.text Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp:;(� Size: - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp:;(� Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp:;(� Size: 5.3MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ