Static task
static1
Behavioral task
behavioral1
Sample
60002138596ecd3863d671ca692f24fa5e503943c0206fcbefae137346355194.exe
Resource
win7-20230220-en
General
-
Target
60002138596ecd3863d671ca692f24fa5e503943c0206fcbefae137346355194.bin
-
Size
4.2MB
-
MD5
7aa33dc3c324e64721eddd7f954cbe6c
-
SHA1
f253d09e54f5600a2ac9c896bf5c20c354792c47
-
SHA256
60002138596ecd3863d671ca692f24fa5e503943c0206fcbefae137346355194
-
SHA512
41728199db87ecef406457ce99c53e623b80eccc738f2e704e9f7531e138ada39014e914f0b8de67cc8637e4bcc7d52c7fffe839e4f24b60e7cb12082d45bbf4
-
SSDEEP
98304:lBlGh/+5icQIDmT+/NZEx+/qTZI59Q18SAMsbCAoo8X+DfK:vog5l7m4L6ZL1pAMKNVm
Malware Config
Signatures
Files
-
60002138596ecd3863d671ca692f24fa5e503943c0206fcbefae137346355194.bin.exe windows x86
5b5b32ca901545df58f1a75cd0391736
Code Sign
3a:9c:f6:79:6a:9e:30:70:28:2f:97:20:7e:ec:d6:64Certificate
IssuerCN=5225102f0434382d242811523e2627225c0650271700133f52163721402002312055,POSTALCODE=10305,ST=0b1c1115005f5c4e0f020a1000040b144b1c0e1a+ST=0b1c1115494a5c041c1150080c17090704050e005006511f0214001f1518010656090d0252450d0309185403131b5207441f1b0d41130a081a5013450802055b0c0b0a070bNot Before11/05/2023, 07:26Not After10/05/2024, 07:26SubjectCN=5225102f0434382d242811523e2627225c0650271700133f52163721402002312055,POSTALCODE=10305,ST=0b1c1115005f5c4e0f020a1000040b144b1c0e1a+ST=0b1c1115494a5c041c1150080c17090704050e005006511f0214001f1518010656090d0252450d0309185403131b5207441f1b0d41130a081a5013450802055b0c0b0a070b5d:2c:c5:9d:a3:83:85:56:72:9c:26:54:bd:45:b4:5b:e9:73:e3:62:c2:b3:2f:47:59:96:f1:3c:33:f5:f2:19Signer
Actual PE Digest5d:2c:c5:9d:a3:83:85:56:72:9c:26:54:bd:45:b4:5b:e9:73:e3:62:c2:b3:2f:47:59:96:f1:3c:33:f5:f2:19Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=5225102f0434382d242811523e2627225c0650271700133f52163721402002312055,POSTALCODE=10305,ST=0b1c1115005f5c4e0f020a1000040b144b1c0e1a+ST=0b1c1115494a5c041c1150080c17090704050e005006511f0214001f1518010656090d0252450d0309185403131b5207441f1b0d41130a081a5013450802055b0c0b0a070b11/05/2023, 10:05 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleA
GetProfileStringW
WaitForSingleObject
CancelWaitableTimer
AddConsoleAliasW
GetModuleHandleW
EnumCalendarInfoExW
IsBadReadPtr
GetConsoleAliasesLengthA
GetNumberFormatA
EnumTimeFormatsA
EnumTimeFormatsW
CreateActCtxW
SetProcessPriorityBoost
GetCalendarInfoA
SetSystemTimeAdjustment
GetSystemWindowsDirectoryA
HeapCreate
DnsHostnameToComputerNameW
WritePrivateProfileStructW
FindNextVolumeW
GetConsoleAliasW
Beep
SetConsoleCursorPosition
GetModuleFileNameW
GetConsoleFontSize
lstrlenW
ReplaceFileA
GlobalUnlock
GetConsoleAliasesW
GetLastError
GetDefaultCommConfigW
GetLongPathNameA
VirtualAlloc
CreateConsoleScreenBuffer
BeginUpdateResourceW
WriteProfileSectionA
RemoveDirectoryA
SetComputerNameA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
IsSystemResumeAutomatic
QueryDosDeviceW
WriteProfileSectionW
AddAtomA
FindFirstVolumeMountPointA
GetModuleHandleA
GetConsoleTitleW
EnumDateFormatsW
GetConsoleCursorInfo
GetShortPathNameW
GetDiskFreeSpaceExA
FindAtomW
GetWindowsDirectoryW
DeleteTimerQueueTimer
AddConsoleAliasA
EnumSystemLocalesW
CreateFileA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
FlushFileBuffers
SetProcessAffinityMask
GetTempFileNameW
GetProcAddress
GetComputerNameA
LCMapStringW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
MultiByteToWideChar
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetModuleFileNameA
ReadFile
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
LCMapStringA
user32
GetSysColorBrush
ToAsciiEx
ChangeMenuW
GetClassInfoExA
SetParent
CreateAcceleratorTableA
GetWindowLongA
gdi32
GetCharWidthA
SetColorAdjustment
GetCharABCWidthsFloatW
winhttp
WinHttpOpen
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ