Static task
static1
Behavioral task
behavioral1
Sample
ea83eb67b9a266e3c3bec25f847d2caee757724751f7e12b3704575a20245445.exe
Resource
win10v2004-20230915-en
General
-
Target
ea83eb67b9a266e3c3bec25f847d2caee757724751f7e12b3704575a20245445
-
Size
4.1MB
-
MD5
3b7e51bbb39aea5f8b7044799df4e2c6
-
SHA1
df0066f9f7df1808ea923b27bcd40a432af5d92d
-
SHA256
ea83eb67b9a266e3c3bec25f847d2caee757724751f7e12b3704575a20245445
-
SHA512
47b1d6865a6563adf27ca0c1997b3d1ffb75e0c90fb6d31506e8ba7a9c229caedbaa5d3ebc40bd690a1e5f6ba8f5c39953fb22b1dc703182f9b4c04140908dbe
-
SSDEEP
98304:hDCDsIB1E72KwjuZQmjRJMu1YPhPgkzX/E2WwisOBlI1Ve2Ihanao:h+D/EXnZXjjQZ4kTcoO3I1VaiN
Malware Config
Signatures
Files
-
ea83eb67b9a266e3c3bec25f847d2caee757724751f7e12b3704575a20245445.exe windows x86
ebb1ad55f48b70b0a48dee8a767738f7
Code Sign
da:9b:b4:1d:c2:46:bd:c4:38:a7:54:94:96:2c:42:d2Certificate
IssuerCN=52201f2f18311d572f560b271a020721531729232121351c16372a14042518241f2d,POSTALCODE=10805,ST=0b1c1115005f5c4e0f020a1000040b140d120e5b1010+ST=0b1c1115494a5c0203141202020e504510065319025209045100410317190c5653150d02501b141f001a0d01060a52121b130a53030f08110d1453190b1a055b0c0b0a070bNot Before20-09-2023 07:30Not After19-09-2024 07:30SubjectCN=52201f2f18311d572f560b271a020721531729232121351c16372a14042518241f2d,POSTALCODE=10805,ST=0b1c1115005f5c4e0f020a1000040b140d120e5b1010+ST=0b1c1115494a5c0203141202020e504510065319025209045100410317190c5653150d02501b141f001a0d01060a52121b130a53030f08110d1453190b1a055b0c0b0a070bb7:00:cc:2a:fe:48:c3:86:6f:72:45:9d:3c:19:04:7b:2f:eb:a3:ea:90:00:35:bb:73:19:5f:ee:46:43:44:cdSigner
Actual PE Digestb7:00:cc:2a:fe:48:c3:86:6f:72:45:9d:3c:19:04:7b:2f:eb:a3:ea:90:00:35:bb:73:19:5f:ee:46:43:44:cdDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
CreateFileA
SetThreadContext
FindFirstChangeNotificationW
WriteConsoleInputW
SetFilePointer
PeekNamedPipe
SetConsoleTextAttribute
OpenJobObjectA
GetLogicalDriveStringsW
InterlockedCompareExchange
CreateHardLinkA
GetTickCount
GetGeoInfoW
LoadLibraryW
SizeofResource
GetFileAttributesW
FileTimeToSystemTime
GetModuleFileNameW
SetThreadPriority
GlobalUnlock
GetShortPathNameA
GetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
BackupWrite
GetTempFileNameA
LoadLibraryA
CreateHardLinkW
FoldStringA
FindNextFileA
FreeEnvironmentStringsW
EnumResourceNamesA
OpenSemaphoreW
FindFirstVolumeA
GetConsoleProcessList
ReadConsoleOutputCharacterW
FindNextVolumeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
ReadFile
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
GetFileType
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
CloseHandle
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
GetModuleHandleA
FlushFileBuffers
SetStdHandle
SetEndOfFile
GetProcessHeap
user32
GetMessageExtraInfo
LoadMenuA
GetClassInfoExW
DdeQueryStringA
CharToOemBuffA
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 711KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ