Static task
static1
Behavioral task
behavioral1
Sample
130df1f64103466ddfc3cd0ebca8c2668567b8c939d7e863a93e2960b8b30361.exe
Resource
win10v2004-20230220-en
General
-
Target
130df1f64103466ddfc3cd0ebca8c2668567b8c939d7e863a93e2960b8b30361
-
Size
4.1MB
-
MD5
4728ed460526a99176667ca263621675
-
SHA1
cf81f0b96bc39b1743762b88a066fa45e4e0d035
-
SHA256
130df1f64103466ddfc3cd0ebca8c2668567b8c939d7e863a93e2960b8b30361
-
SHA512
f09274b5707fb61388cc8601cb0ebc591a85e4ae633a0190257ce9f051beb28acc018853eb08ac3e61ffb4cc7075f9976aa60ec5c165c825d15490872151c219
-
SSDEEP
98304:HJEne3F8CvPKUyRZozsq2qqxygBQ1PGR+eerWlqXHGio0X:Hz3zvvyRZozsFqUygm14eW170X
Malware Config
Signatures
Files
-
130df1f64103466ddfc3cd0ebca8c2668567b8c939d7e863a93e2960b8b30361.exe windows x86
21150e4f7b9effdd3707c48abd03e889
Code Sign
0c:8e:b8:66:37:ad:7b:4c:4d:85:35:4f:06:4d:7e:4cCertificate
IssuerCN=522a1720000d011b430433013e102d3427142b4024102b2a13264116170e10372429,POSTALCODE=10407,ST=0b1c1115005f5c4e16070b061d170a034b100d1a1601+ST=0b1c1115494a5c53171153050a060e05131d031c1702195d090014094753050d0f011f15150b1f1c100c1507545c1d0e011f070501080c0e5e0b0e450c12055b0c0b0a070bNot Before15/05/2023, 23:42Not After14/05/2024, 23:42SubjectCN=522a1720000d011b430433013e102d3427142b4024102b2a13264116170e10372429,POSTALCODE=10407,ST=0b1c1115005f5c4e16070b061d170a034b100d1a1601+ST=0b1c1115494a5c53171153050a060e05131d031c1702195d090014094753050d0f011f15150b1f1c100c1507545c1d0e011f070501080c0e5e0b0e450c12055b0c0b0a070b7e:cf:25:61:a8:62:0a:84:6f:83:7e:5f:75:62:90:41:23:91:00:af:e2:a0:d1:97:44:bd:31:cd:fd:4f:30:48Signer
Actual PE Digest7e:cf:25:61:a8:62:0a:84:6f:83:7e:5f:75:62:90:41:23:91:00:af:e2:a0:d1:97:44:bd:31:cd:fd:4f:30:48Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=522a1720000d011b430433013e102d3427142b4024102b2a13264116170e10372429,POSTALCODE=10407,ST=0b1c1115005f5c4e16070b061d170a034b100d1a1601+ST=0b1c1115494a5c53171153050a060e05131d031c1702195d090014094753050d0f011f15150b1f1c100c1507545c1d0e011f070501080c0e5e0b0e450c12055b0c0b0a070b15/05/2023, 13:32 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
SearchPathW
EnumCalendarInfoA
GetDriveTypeW
AllocConsole
GetProfileIntW
GetConsoleAliasExesLengthA
InterlockedDecrement
GetProfileSectionA
SetVolumeMountPointW
FreeEnvironmentStringsA
MoveFileWithProgressA
GetTickCount
GetSystemTimeAsFileTime
EnumTimeFormatsA
GetUserDefaultLangID
ActivateActCtx
GetPrivateProfileIntA
AddRefActCtx
WideCharToMultiByte
LoadLibraryW
IsProcessInJob
GetCalendarInfoA
GetStringTypeExW
GetFileAttributesW
GetModuleFileNameW
CreateFileW
GetOverlappedResult
CompareStringW
GetVolumePathNameA
EnumSystemLocalesA
GetCurrentDirectoryW
SetLastError
GetProcAddress
HeapSize
SetComputerNameA
GetTempFileNameA
SetFileApisToOEM
WriteConsoleA
LocalAlloc
SetCalendarInfoW
RemoveDirectoryW
BeginUpdateResourceA
AddAtomA
FindFirstVolumeMountPointA
GetModuleHandleA
lstrcatW
FreeEnvironmentStringsW
FindNextFileW
SetThreadAffinityMask
FileTimeToLocalFileTime
GetVolumeNameForVolumeMountPointW
DeleteFileW
DeleteAtom
DeleteFileA
InterlockedIncrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameA
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 6.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ