Static task
static1
Behavioral task
behavioral1
Sample
19180f2ad7a48d765ee7f5149f3f278b5343ea9f49ec82df9ba4544824189f9d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
19180f2ad7a48d765ee7f5149f3f278b5343ea9f49ec82df9ba4544824189f9d.exe
Resource
win10v2004-20230220-en
General
-
Target
19180f2ad7a48d765ee7f5149f3f278b5343ea9f49ec82df9ba4544824189f9d.zip
-
Size
1.3MB
-
MD5
74435c0cd6d55b0ff426318410f0d919
-
SHA1
767d2f40f4b60d4d511a7f9a1d964cc9dc840b1e
-
SHA256
3e05f8ab0d8334cc7c91d258703584b329743ac5bedb0c13c801ac973936a51f
-
SHA512
08f276886253d5be694bf710644570008500c6542f3f2775afc5c4a1760d7cbe59de67236aeec370c1eb1f7ae2aab169c49220f27d5f9374b344cad784fa130a
-
SSDEEP
24576:6nHYQZOZKbCTN74mMdTWufyyLBPjpfG9YhU3o7c9Z5Y2FrG6fEZgZHF:gHBZOoCx2Cua4BPjZGLoA5Y2ZpxdF
Malware Config
Signatures
Files
-
19180f2ad7a48d765ee7f5149f3f278b5343ea9f49ec82df9ba4544824189f9d.zip.zip
Password: infected
-
19180f2ad7a48d765ee7f5149f3f278b5343ea9f49ec82df9ba4544824189f9d.exe.exe windows x86
Password: infected
5044024844498395d0e63ba22bbd9978
Code Sign
32:8e:00:6a:5d:77:2b:51:97:eb:03:43:9c:ba:f1:bbCertificate
IssuerCN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/04/2022, 00:00Not After06/04/2023, 23:59SubjectCN=allmusicals.com7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12/01/2016, 00:00Not After11/01/2031, 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23/12/2017, 00:00Not After22/03/2029, 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
59:32:37:41:a2:2b:24:df:40:d1:3a:c0:84:41:75:94:be:2a:68:50:c1:f8:1d:1a:f2:9b:e5:8c:09:0c:6d:1fSigner
Actual PE Digest59:32:37:41:a2:2b:24:df:40:d1:3a:c0:84:41:75:94:be:2a:68:50:c1:f8:1d:1a:f2:9b:e5:8c:09:0c:6d:1fDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=allmusicals.com15/03/2023, 19:59 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetUserDefaultLangID
TlsSetValue
GlobalAlloc
LoadLibraryW
GetModuleFileNameW
GetACP
lstrlenW
SetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
QueueUserAPC
IsValidCodePage
GetCurrentProcess
GetLargePageMinimum
GetModuleHandleA
FreeEnvironmentStringsW
CompareStringA
GetThreadUILanguage
CloseHandle
SetStdHandle
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
lstrlenA
LockResource
TryEnterCriticalSection
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
RtlUnwind
GetModuleHandleExW
InitializeCriticalSectionAndSpinCount
GetLastError
ExitProcess
MultiByteToWideChar
HeapValidate
GetSystemInfo
GetStdHandle
WriteFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
TerminateProcess
GetStartupInfoW
GetModuleHandleW
GetCurrentThreadId
GetProcessHeap
GetFileType
InitOnceExecuteOnce
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
WideCharToMultiByte
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
LoadLibraryExW
OutputDebugStringA
WriteConsoleW
GetOEMCP
GetCPInfo
HeapFree
HeapReAlloc
HeapSize
HeapQueryInformation
HeapAlloc
LCMapStringEx
CreateFileW
user32
GetDesktopWindow
SetWindowPos
FindWindowA
SetDlgItemTextA
GetShellWindow
OpenIcon
gdi32
SelectObject
DeleteObject
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ