Static task
static1
Behavioral task
behavioral1
Sample
e7db4f5d4ef988a40543137add593a62f2452c7b0bd493a9473d2f74b2326a72.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e7db4f5d4ef988a40543137add593a62f2452c7b0bd493a9473d2f74b2326a72.exe
Resource
win10v2004-20230703-en
General
-
Target
11179698371.zip
-
Size
30.7MB
-
MD5
f9bcc517e8672f2b28dd62e4af9cb544
-
SHA1
607d0a4704f48ce47277c1655b20f65a66ac3323
-
SHA256
666036e1fba81eb661add824ca34ab741f5fb11fc844d7da7afc8f37d98d57c1
-
SHA512
616119851f0b622ca2dbf429a753ea75a076cc728b51d6a8d4238c097172f4adf341e4a57b8891a616f1e7342341ffaa87032d42772582d8a78a1e56009ef9d0
-
SSDEEP
786432:oVhtgu+YwGX1sjElH3sHjj0noUDMjrSyUPxu5Bj8Hd1jcB:oVhtR+YcjElHcEnoHrSFxu5ejE
Malware Config
Signatures
Files
-
11179698371.zip.zip
Password: infected
-
e7db4f5d4ef988a40543137add593a62f2452c7b0bd493a9473d2f74b2326a72.exe windows x64
7d19699275e08b389d5869dc7132efbc
Code Sign
12:fc:ab:89:9d:bb:36:83:40:b1:40:f9:20:1f:b9:64Certificate
IssuerCN={67091581-D160-44FE-A473-2411E2F22E3B}Not Before15/07/2023, 06:49Not After14/07/2024, 12:49SubjectCN={67091581-D160-44FE-A473-2411E2F22E3B}0c:4d:69:72:4b:94:fa:3c:2a:4a:3d:29:07:80:3d:5aCertificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before21/09/2022, 00:00Not After21/11/2033, 23:59SubjectCN=DigiCert Timestamp 2022 - 2,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
dd:39:0e:8a:e7:c3:10:9d:8d:1e:28:03:30:27:91:fc:5b:fb:18:4d:26:b5:3e:2b:ff:b5:13:7d:29:b6:08:6eSigner
Actual PE Digestdd:39:0e:8a:e7:c3:10:9d:8d:1e:28:03:30:27:91:fc:5b:fb:18:4d:26:b5:3e:2b:ff:b5:13:7d:29:b6:08:6eDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFullPathNameW
GetTempPathW
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetEnvironmentVariableW
GetCurrentProcess
IsWow64Process
GetModuleFileNameW
GetModuleHandleExW
GetProcAddress
LoadLibraryExW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
RtlUnwindEx
RaiseException
OutputDebugStringW
GetModuleHandleW
GetCurrentProcessId
Sleep
RemoveDirectoryW
DeleteCriticalSection
CreateDirectoryW
RtlPcToFileHeader
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LCMapStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
InitializeCriticalSectionAndSpinCount
SetLastError
DecodePointer
EncodePointer
GetStringTypeW
user32
MessageBoxW
shell32
ShellExecuteW
advapi32
RegOpenKeyExW
RegCloseKey
ReportEventW
RegisterEventSourceW
DeregisterEventSource
RegGetValueW
api-ms-win-crt-runtime-l1-1-0
_initialize_wide_environment
_set_app_type
_invalid_parameter_noinfo_noreturn
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
terminate
_configure_wide_argv
exit
_exit
__p___argc
__p___wargv
_c_exit
_register_thread_local_exe_atexit_callback
abort
_get_initial_wide_environment
_errno
_initterm
_initialize_onexit_table
_initterm_e
api-ms-win-crt-heap-l1-1-0
malloc
calloc
free
_callnewh
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
frexp
api-ms-win-crt-stdio-l1-1-0
_wfopen
__stdio_common_vswprintf
fclose
fread
fseek
fwrite
__acrt_iob_func
_set_fmode
fputwc
fputws
__stdio_common_vfwprintf
fflush
__p__commode
__stdio_common_vsprintf_s
api-ms-win-crt-string-l1-1-0
_wcsicmp
_wcsdup
_wcsnicmp
wcsncmp
strcspn
wcsnlen
memset
strcpy_s
api-ms-win-crt-locale-l1-1-0
_unlock_locales
__pctype_func
___lc_locale_name_func
___mb_cur_max_func
setlocale
_configthreadlocale
_lock_locales
localeconv
___lc_codepage_func
api-ms-win-crt-filesystem-l1-1-0
_wremove
_wrename
api-ms-win-crt-convert-l1-1-0
_wtoi
wcstoul
api-ms-win-crt-time-l1-1-0
wcsftime
_gmtime64
_time64
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ