Static task
static1
Behavioral task
behavioral1
Sample
00a49a5171cba60b91409f9679669d8e9515e64ee81d61e096a2dfeb0128d15a.exe
Resource
win7-20230220-en
General
-
Target
00a49a5171cba60b91409f9679669d8e9515e64ee81d61e096a2dfeb0128d15a.bin
-
Size
4.2MB
-
MD5
92323fdf2ff7af6a69470b99cd0f040e
-
SHA1
075569d158706543456a7f0bdc2bf0b4b8823c48
-
SHA256
00a49a5171cba60b91409f9679669d8e9515e64ee81d61e096a2dfeb0128d15a
-
SHA512
7abaa1f89e4faa643e6d72d4439412c452f62f15f05501b106ecbaf8c2685caf2f5b1af07b1ec4a7ea3d13cc578f487694549eb95b958071e63af8e08e007b6f
-
SSDEEP
98304:kJ2qKS0cigKfVXhGGDh1Q+XT8PZsbfdCa1YHAy/lkUFTHPXJBAR0D3eePr:jqh0zfVoGDhiYTrb4a1C7/lvtf7ARkea
Malware Config
Signatures
Files
-
00a49a5171cba60b91409f9679669d8e9515e64ee81d61e096a2dfeb0128d15a.bin.exe windows x86
22c62657bb76afcf6ff91956792dfd6f
Code Sign
52:2c:94:47:97:0c:d8:7e:c1:f5:bc:55:67:67:a1:2eCertificate
IssuerCN=52251f5711571c0f0d0d243a002f3139341c263d07362111531206573b1100053331,POSTALCODE=10307,ST=0b1c1115005f5c4e1802161701040e1609164f14064b0c1a02+ST=0b1c1115494a5c0e46050a0d120f1645561d521a15010e0a07500703161643105207180c51000c010f1413070a07025344080a0019190c561800501c570a055b0c0b0a070bNot Before11/05/2023, 07:47Not After10/05/2024, 07:47SubjectCN=52251f5711571c0f0d0d243a002f3139341c263d07362111531206573b1100053331,POSTALCODE=10307,ST=0b1c1115005f5c4e1802161701040e1609164f14064b0c1a02+ST=0b1c1115494a5c0e46050a0d120f1645561d521a15010e0a07500703161643105207180c51000c010f1413070a07025344080a0019190c561800501c570a055b0c0b0a070bb3:dc:42:ed:f9:72:4f:ae:d3:79:3a:be:96:21:2d:1c:3e:99:8d:91:a4:dd:6c:d3:9d:ec:e6:b6:8b:1b:69:4dSigner
Actual PE Digestb3:dc:42:ed:f9:72:4f:ae:d3:79:3a:be:96:21:2d:1c:3e:99:8d:91:a4:dd:6c:d3:9d:ec:e6:b6:8b:1b:69:4dDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=52251f5711571c0f0d0d243a002f3139341c263d07362111531206573b1100053331,POSTALCODE=10307,ST=0b1c1115005f5c4e1802161701040e1609164f14064b0c1a02+ST=0b1c1115494a5c0e46050a0d120f1645561d521a15010e0a07500703161643105207180c51000c010f1413070a07025344080a0019190c561800501c570a055b0c0b0a070b11/05/2023, 10:06 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileStringW
WaitForSingleObject
CancelWaitableTimer
AddConsoleAliasW
GetModuleHandleW
EnumCalendarInfoExW
GetConsoleAliasesLengthA
GetNumberFormatA
EnumTimeFormatsA
EnumTimeFormatsW
CreateActCtxW
SetProcessPriorityBoost
GetCalendarInfoA
GetSystemWindowsDirectoryA
HeapCreate
DnsHostnameToComputerNameW
FindNextVolumeW
GetConsoleAliasW
Beep
SetConsoleCursorPosition
GetModuleFileNameW
GetConsoleFontSize
lstrlenW
ReplaceFileA
GlobalUnlock
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
ReadConsoleA
BeginUpdateResourceW
WriteProfileSectionA
RemoveDirectoryA
SetComputerNameA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
IsSystemResumeAutomatic
QueryDosDeviceW
WriteProfileSectionW
AddAtomA
FindFirstVolumeMountPointA
GetModuleHandleA
GetConsoleTitleW
EnumDateFormatsW
GetConsoleCursorInfo
GetShortPathNameW
GetDiskFreeSpaceExA
FindAtomW
GetWindowsDirectoryW
DeleteTimerQueueTimer
AddConsoleAliasA
EnumSystemLocalesW
CreateFileA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
FlushFileBuffers
GetDefaultCommConfigW
SetProcessAffinityMask
CreateConsoleScreenBuffer
GetTempFileNameW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
MultiByteToWideChar
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetModuleFileNameA
ReadFile
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
LCMapStringA
LCMapStringW
user32
SetParent
ToAsciiEx
ChangeMenuW
GetClassInfoExA
GetWindowLongA
CreateAcceleratorTableA
GetSysColorBrush
gdi32
GetCharWidthA
SetColorAdjustment
GetCharABCWidthsFloatW
winhttp
WinHttpOpen
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ