Behavioral task
behavioral1
Sample
PDF转æ¢å¨@2990.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PDF转æ¢å¨@2990.exe
Resource
win10v2004-20230220-en
General
-
Target
PDF转换器@2990.exe.7z
-
Size
874KB
-
MD5
b3cf0946b2934eec4c85baf7619ae482
-
SHA1
2bfda447cd18051f2ea332a2c4ad4fd376ad8bec
-
SHA256
704ba3b362ee86b0d940e520d9edf275ce89b847eb98c68439a6ff4729aa3f8d
-
SHA512
17111dcc79d560945372b656b4547df17fde773eff22d185ecea5735e0fa67e28008829f208634bec3fa597fb77e0f1371eff3730614850d1e2cfda0c80905d4
-
SSDEEP
24576:4y+gEhqEUB0tzPCquhtWeFzwUa9ovMOccDEHQ:4iEh3UG6qHe5wfovkcDn
Malware Config
Signatures
-
resource yara_rule static1/unpack001/PDF转æ¢å¨@2990.exe vmprotect
Files
-
PDF转换器@2990.exe.7z.7z .ps1
Password: infected
-
PDF转æ¢å¨@2990.exe.exe windows x86
eae82bfb9a786881e7499bf38da6de72
Code Sign
02:6e:6c:75:6c:a2:83:b7:46:6b:c7:ba:6b:e2:be:c9Certificate
IssuerCN=NVIDIA Corporation,ST=Hubei,C=China,1.2.840.113549.1.9.1=#1300Not Before27/11/2021, 05:19Not After31/12/2023, 16:00SubjectCN=NVIDIA Corporation,ST=Hubei,C=China,1.2.840.113549.1.9.1=#13000e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0c:4d:69:72:4b:94:fa:3c:2a:4a:3d:29:07:80:3d:5aCertificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before21/09/2022, 00:00Not After21/11/2033, 23:59SubjectCN=DigiCert Timestamp 2022 - 2,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
02:6e:6c:75:6c:a2:83:b7:46:6b:c7:ba:6b:e2:be:c9Certificate
IssuerCN=NVIDIA Corporation,ST=Hubei,C=China,1.2.840.113549.1.9.1=#1300Not Before27/11/2021, 05:19Not After31/12/2023, 16:00SubjectCN=NVIDIA Corporation,ST=Hubei,C=China,1.2.840.113549.1.9.1=#13000c:4d:69:72:4b:94:fa:3c:2a:4a:3d:29:07:80:3d:5aCertificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before21/09/2022, 00:00Not After21/11/2033, 23:59SubjectCN=DigiCert Timestamp 2022 - 2,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
57:c2:32:34:5c:31:d5:91:5c:1f:28:49:cd:58:b4:a5:de:bb:26:36:a0:a4:62:02:f3:1d:80:f0:9d:93:39:dbSigner
Actual PE Digest57:c2:32:34:5c:31:d5:91:5c:1f:28:49:cd:58:b4:a5:de:bb:26:36:a0:a4:62:02:f3:1d:80:f0:9d:93:39:dbDigest Algorithmsha256PE Digest Matchestruef1:b9:86:5a:af:43:58:05:35:77:a4:37:7f:cd:ac:f3:09:cf:7c:60Signer
Actual PE Digestf1:b9:86:5a:af:43:58:05:35:77:a4:37:7f:cd:ac:f3:09:cf:7c:60Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareFileTime
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CharUpperBuffW
urlmon
URLDownloadToFileA
Sections
.text Size: - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 685KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 930KB - Virtual size: 929KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ